<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Deserialization — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/deserialization/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:41:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/deserialization/feed.xml" rel="self" type="application/rss+xml"/><item><title>Hyperledger Fabric SDK Java Deserialization RCE</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-fabric-deserialization/</link><pubDate>Wed, 29 Apr 2026 20:41:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-fabric-deserialization/</guid><description>The deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.</description><content:encoded><![CDATA[<p>The <code>fabric-sdk-java</code> client SDK, a deprecated component of Hyperledger Fabric, contains a critical vulnerability related to insecure deserialization. Specifically, the <code>Channel.java</code> file implements <code>readObject()</code> and exposes <code>deSerializeChannel()</code> methods that call <code>ObjectInputStream.readObject()</code> on untrusted byte arrays without configuring an <code>ObjectInputFilter</code>. This omission allows an attacker to inject malicious serialized Java objects, leading to remote code execution (RCE). While <code>fabric-sdk-java</code> has been deprecated since Hyperledger Fabric v2.5 and replaced by <code>org.hyperledger.fabric:fabric-gateway</code>, organizations that have not yet migrated are still vulnerable. This issue highlights the risks associated with using deprecated software and the importance of migrating to supported versions. The vulnerability exists in versions 1.0.0 through 2.2.26.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious serialized Java object using a tool like <code>ysoserial</code>. For example, <code>java -jar ysoserial.jar CommonsCollections6 &quot;touch /tmp/pwned&quot; &gt; malicious_channel.ser</code>.</li>
<li>The attacker gains the ability to supply crafted serialized Channel bytes to the client application. This could involve compromising a local channel file.</li>
<li>The attacker injects the malicious serialized data through an application that accepts Channel bytes from external sources.</li>
<li>The vulnerable <code>deSerializeChannel()</code> method in <code>Channel.java</code> is called with the attacker-controlled byte array.</li>
<li>Inside <code>deSerializeChannel()</code>, an <code>ObjectInputStream</code> is created from the byte array.</li>
<li>The <code>readObject()</code> method of <code>ObjectInputStream</code> is called without any <code>ObjectInputFilter</code>, deserializing the malicious object.</li>
<li>The deserialization process triggers the execution of a gadget chain embedded in the malicious object.</li>
<li>The gadget chain executes arbitrary code on the server, achieving RCE.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the server running the vulnerable <code>fabric-sdk-java</code> application. This can lead to complete system compromise, data breaches, and other malicious activities. The severity is critical due to the potential for unauthenticated remote code execution. Organizations still using the deprecated <code>fabric-sdk-java</code> are at high risk until they migrate to the supported <code>fabric-gateway</code>.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Migrate to <code>org.hyperledger.fabric:fabric-gateway</code> immediately</strong> as the primary remediation, as it does not use Java serialization.</li>
<li>For organizations unable to migrate immediately, apply the suggested fix of adding an <code>ObjectInputFilter</code> to whitelist only expected classes as described in the advisory.</li>
<li>Implement runtime monitoring of Java deserialization to detect and prevent exploitation attempts.</li>
<li>Enable logging of deserialization events to aid in incident response.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>deserialization</category><category>rce</category><category>java</category></item><item><title>Apache MINA Arbitrary Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-apache-mina-rce/</link><pubDate>Mon, 27 Apr 2026 16:09:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apache-mina-rce/</guid><description>A critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.</description><content:encoded><![CDATA[<p>A critical arbitrary code execution vulnerability, CVE-2026-41635, has been identified in Apache MINA, an open-source network application framework. The vulnerability affects versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5. The flaw lies within the AbstractIoBuffer.resolveClass() method, where a branch lacks class validation, bypassing the classname allowlist. This allows remote attackers with low privileges to execute arbitrary code on systems using Apache MINA when the IoBuffer.getObject() method is called. Successful exploitation can lead to full system compromise, data exfiltration, and further attacks on interconnected systems. It is imperative that organizations using Apache MINA apply the necessary patches immediately to mitigate this critical risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable application using Apache MINA versions 2.0.0-2.0.27, 2.1.0-2.1.10, or 2.2.0-2.2.5.</li>
<li>The attacker crafts a malicious payload containing serialized Java objects designed to exploit the class validation bypass in <code>AbstractIoBuffer.resolveClass()</code>.</li>
<li>The attacker sends a network request to the vulnerable application that triggers the <code>IoBuffer.getObject()</code> method.</li>
<li>The <code>IoBuffer.getObject()</code> method deserializes the attacker-controlled data without proper class validation due to the flaw in <code>AbstractIoBuffer.resolveClass()</code>.</li>
<li>The malicious serialized object executes arbitrary code within the context of the application.</li>
<li>The attacker gains control of the application server.</li>
<li>The attacker uses their access to move laterally within the network.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41635 allows attackers to execute arbitrary code on systems utilizing vulnerable versions of Apache MINA. This can lead to a full compromise of the affected system, including data exfiltration, denial of service, or further attacks on interconnected systems. The vulnerability is remotely exploitable with low privileges, increasing the potential for widespread impact across various sectors relying on Apache MINA for network communication. A successful attack poses a high risk to the confidentiality, integrity, and availability of affected systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Apache MINA to the latest version to remediate CVE-2026-41635, as recommended by the vendor advisory (<a href="https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm)">https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm)</a>.</li>
<li>Implement network monitoring to detect suspicious activity related to deserialization attempts, as suggested by the CCB&rsquo;s recommendation to upscale monitoring capabilities.</li>
<li>Deploy the Sigma rule &ldquo;Detect Apache MINA Vulnerable Class Deserialization Attempt&rdquo; to identify potential exploitation attempts based on suspicious class names in network traffic.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>apache-mina</category><category>rce</category><category>deserialization</category><category>cve-2026-41635</category></item><item><title>ERB Deserialization Bypass via def_module/def_method/def_class</title><link>https://feed.craftedsignal.io/briefs/2026-04-erb-deserialization/</link><pubDate>Sat, 25 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-erb-deserialization/</guid><description>A deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.</description><content:encoded><![CDATA[<p>Ruby versions before ERB 2.2.0 implemented an <code>@_init</code> instance variable guard in <code>ERB#result</code> and <code>ERB#run</code> to prevent code execution upon deserialization via <code>Marshal.load</code>. This guard is intended to block execution when an ERB object is reconstructed from untrusted data. However, the methods <code>ERB#def_method</code>, <code>ERB#def_module</code>, and <code>ERB#def_class</code> were not given the same protection, creating a bypass. An attacker capable of triggering <code>Marshal.load</code> on untrusted data in a Ruby application with the <code>erb</code> gem loaded can exploit <code>ERB#def_module</code> (using its zero-argument, default-parameter form) as a code execution sink. This bypass impacts Ruby on Rails applications that import untrusted serialized data, Ruby tools employing <code>Marshal.load</code> for caching or IPC, and legacy Rails applications (pre-7.0) utilizing Marshal for cookie session serialization. This bypass renders the <code>@_init</code> mitigation ineffective across all ERB versions from 2.2.0 through 6.0.3. Combined with the DeprecatedInstanceVariableProxy gadget (present in all ActiveSupport versions through 7.2.3), this enables a universal RCE gadget chain for Ruby 3.2+ applications using Rails. The vulnerability is identified as CVE-2026-41316.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Ruby object containing an <code>ERB</code> instance and/or an <code>ActiveSupport::Deprecation::DeprecatedInstanceVariableProxy</code> instance.</li>
<li>The <code>ERB</code> instance has its <code>@src</code> instance variable set to a string containing malicious code with the &ldquo;end\nsystem(&lsquo;id&rsquo;)\ndef x&rdquo; payload.</li>
<li>The vulnerable application calls <code>Marshal.load</code> on the crafted object, triggering deserialization.</li>
<li>During deserialization, the <code>DeprecatedInstanceVariableProxy</code> is instantiated (if used), which then invokes the <code>ERB#def_module</code> method via <code>method_missing</code>.</li>
<li>The <code>ERB#def_module</code> method calls <code>ERB#def_method</code> without checking the <code>@_init</code> guard.</li>
<li>Inside <code>ERB#def_method</code>, the malicious code in <code>@src</code> is wrapped in a method definition and evaluated via <code>module_eval</code>.</li>
<li>The &ldquo;end\nsystem(&lsquo;id&rsquo;)\ndef x&rdquo; payload causes the <code>system('id')</code> command to execute during the <code>module_eval</code> call, bypassing the intended deserialization protection.</li>
<li>The attacker achieves arbitrary code execution on the target system, gaining the ability to perform malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to execute arbitrary code on the target system. This affects Ruby applications, including Ruby on Rails, which use <code>Marshal.load</code> on untrusted data. Specific impact includes potential compromise of web servers and the ability to read sensitive files, modify data, or install malware. Vulnerable applications include those using <code>Marshal.load</code> for caching, data import, or IPC, and legacy Rails applications (pre-7.0) using Marshal for cookie session serialization. This bypass renders the @_init mitigation ineffective across all ERB versions from 2.2.0 through 6.0.3.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade your erb gem to version 4.0.3.1, 4.0.4.1, 6.0.1.1, or 6.0.4 to patch the vulnerability as described in the &ldquo;Patches&rdquo; section.</li>
<li>Avoid using <code>Marshal.load</code> on untrusted data, as it is inherently unsafe. Consider using alternative serialization formats like JSON or YAML.</li>
<li>Deploy the &ldquo;Detect ERB def_module Code Execution via Deserialization&rdquo; Sigma rule to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>deserialization</category><category>rce</category><category>ruby</category><category>rails</category></item><item><title>Ray Data Remote Code Execution via Parquet Arrow Extension Type Deserialization</title><link>https://feed.craftedsignal.io/briefs/2026-04-ray-parquet-rce/</link><pubDate>Fri, 24 Apr 2026 16:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ray-parquet-rce/</guid><description>Ray Data is vulnerable to remote code execution via Parquet Arrow Extension Type Deserialization; specifically, a maliciously crafted Parquet file can trigger arbitrary code execution due to the unsafe deserialization of Arrow extension metadata, affecting Ray versions 2.49.0 through 2.54.0.</description><content:encoded><![CDATA[<p>Ray Data, a component of the Ray distributed computing framework, is susceptible to remote code execution (RCE) due to unsafe deserialization of Parquet file metadata. The vulnerability stems from Ray&rsquo;s registration of custom Arrow extension types (<code>ray.data.arrow_tensor</code>, <code>ray.data.arrow_tensor_v2</code>, <code>ray.data.arrow_variable_shaped_tensor</code>) within PyArrow. When a Parquet file containing these extension types is processed, the <code>__arrow_ext_deserialize__</code> function is invoked, leading to the execution of arbitrary code through <code>cloudpickle.loads()</code> on the field&rsquo;s metadata, prior to any data being read.  This issue affects Ray versions 2.49.0 through 2.54.0, introduced in July 2025 via commit <code>f6d21db1a4</code>. Successful exploitation does not require authentication or network access to a Ray cluster. Instead, it hinges on the framework reading a maliciously crafted Parquet file, which can originate from various sources like cloud storage, HuggingFace datasets, or shared file systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a Parquet file containing a column with a <code>ray.data.arrow_tensor</code>, <code>ray.data.arrow_tensor_v2</code>, or <code>ray.data.arrow_variable_shaped_tensor</code> extension type.</li>
<li>The attacker injects a malicious payload in the <code>ARROW:extension:metadata</code> field of the Parquet file, serialized using <code>cloudpickle</code>.</li>
<li>The attacker places the crafted Parquet file in a location accessible to a Ray Data pipeline, such as a HuggingFace dataset, a shared filesystem, or a cloud storage bucket.</li>
<li>A Ray Data pipeline, using functions like <code>ray.data.read_parquet()</code>, <code>pyarrow.parquet.read_table()</code>, or <code>pandas.read_parquet()</code>, attempts to read the Parquet file.</li>
<li>During schema parsing, PyArrow encounters the custom Arrow extension type and automatically calls the <code>__arrow_ext_deserialize__</code> method.</li>
<li>The <code>__arrow_ext_deserialize__</code> method invokes <code>_deserialize_with_fallback()</code>, which attempts to deserialize the metadata using <code>cloudpickle.loads()</code>.</li>
<li>The <code>cloudpickle.loads()</code> function executes the attacker&rsquo;s arbitrary code from the crafted Parquet metadata.</li>
<li>The attacker achieves arbitrary command execution as the user running the Ray worker process, potentially leading to full server compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability affects Ray versions 2.49.0 through 2.54.0, impacting any process utilizing Ray Data that reads Parquet files. The global registration of extension types in PyArrow means that all Parquet reads within the affected process are vulnerable. An attacker can achieve arbitrary command execution as the Ray worker process user, leading to full server compromise, without requiring authentication or cluster access. Successful exploitation allows attackers to compromise systems by simply placing a malicious Parquet file in a location that a Ray Data pipeline processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Ray to a patched version beyond 2.54.0 to remediate the vulnerability, ensuring the fix addresses the <code>cloudpickle.loads()</code> call in the deserialization path.</li>
<li>Implement strict input validation and sanitization for Parquet files before processing them with Ray Data to prevent the execution of malicious payloads embedded in the <code>ARROW:extension:metadata</code> field.</li>
<li>Monitor for suspicious process execution originating from <code>python</code> processes using <code>cloudpickle.loads()</code> with the intent of arbitrary code execution.</li>
<li>Deploy the Sigma rule <code>Detect Ray Data Parquet Deserialization RCE</code> to detect exploitation attempts by monitoring for specific metadata within Parquet files.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>remote-code-execution</category><category>parquet</category><category>deserialization</category><category>cloudpickle</category><category>ray</category></item><item><title>Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)</title><link>https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</link><pubDate>Wed, 22 Apr 2026 08:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</guid><description>An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.</description><content:encoded><![CDATA[<p>CVE-2026-6023 exposes a critical vulnerability within the RadFilter control of Progress Telerik UI for AJAX. Affecting versions 2024.4.1114 to 2026.1.421, this flaw stems from insecure deserialization practices. The vulnerability arises when the filter state is exposed to the client, enabling malicious actors to manipulate this state. Successful exploitation grants attackers the ability to execute arbitrary code on the server. This vulnerability poses a significant risk to organizations utilizing the affected Telerik UI for AJAX versions, potentially leading to complete system compromise and data breaches. Defenders must promptly address this issue through patching or mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a web application utilizing a vulnerable version of Progress Telerik UI for AJAX (2024.4.1114 - 2026.1.421) with the RadFilter control enabled.</li>
<li>The attacker observes the RadFilter control&rsquo;s behavior, specifically how filter states are serialized and exposed to the client-side, typically within the HTTP request or response.</li>
<li>The attacker intercepts the serialized filter state data, often Base64 encoded or similar, transmitted between the client and server.</li>
<li>The attacker crafts a malicious serialized payload containing instructions to execute arbitrary code on the server. This involves exploiting the insecure deserialization process.</li>
<li>The attacker replaces the original, legitimate serialized filter state with the malicious payload.</li>
<li>The attacker sends the modified request containing the malicious serialized data to the server.</li>
<li>The Telerik UI for AJAX application on the server attempts to deserialize the tampered data using the RadFilter control.</li>
<li>Due to the insecure deserialization vulnerability, the malicious payload is executed, granting the attacker remote code execution on the server. The attacker can then perform actions such as installing malware, exfiltrating sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6023 can lead to complete compromise of the affected server. An attacker can gain remote code execution, enabling them to install malware, steal sensitive data, or disrupt critical business operations. Given the widespread use of Telerik UI in enterprise applications, this vulnerability could potentially impact a large number of organizations across various sectors. Unpatched systems are at high risk of being exploited, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Progress Telerik UI for AJAX to a patched version outside the range of 2024.4.1114 through 2026.1.421 to remediate CVE-2026-6023.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Telerik RadFilter Deserialization Attempt</code> to identify attempts to exploit the deserialization vulnerability by monitoring for suspicious HTTP requests targeting the RadFilter control (Log source: webserver).</li>
<li>Implement input validation and sanitization on the server-side to prevent malicious data from being deserialized.</li>
<li>Monitor web server logs for unusual activity related to the RadFilter control, such as requests with abnormally large or malformed serialized data (Log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6023</category><category>telerik</category><category>deserialization</category><category>rce</category><category>webserver</category></item><item><title>MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metaslider-deserialization/</link><pubDate>Tue, 21 Apr 2026 10:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metaslider-deserialization/</guid><description>A deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-39467 is a critical vulnerability affecting the MetaSlider Responsive Slider plugin for WordPress. Specifically, it is a Deserialization of Untrusted Data vulnerability that can lead to Object Injection. The vulnerability exists in versions up to and including 3.106.0. An attacker can exploit this vulnerability to inject arbitrary PHP objects into the application, potentially leading to remote code execution. This is possible because the plugin deserializes data without proper validation, allowing malicious actors to manipulate serialized data and inject harmful objects. The vulnerability was reported by Patchstack. Given the widespread use of WordPress and the MetaSlider plugin, this vulnerability poses a significant risk to a large number of websites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker sends a crafted HTTP request to a WordPress endpoint that processes MetaSlider plugin data.</li>
<li>The request contains a serialized PHP object designed for malicious purposes.</li>
<li>The MetaSlider plugin deserializes the untrusted data without proper sanitization or validation using <code>unserialize()</code>.</li>
<li>The deserialization process instantiates the malicious PHP object.</li>
<li>The injected object executes its malicious payload, potentially writing files to the server.</li>
<li>The attacker leverages the file write capability to plant a PHP webshell in the WordPress uploads directory.</li>
<li>The attacker accesses the webshell via a direct HTTP request.</li>
<li>The attacker executes arbitrary commands on the server via the webshell, gaining full control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39467 allows an unauthenticated attacker to inject arbitrary PHP objects, leading to remote code execution on the target WordPress server. This could result in complete compromise of the website, including data theft, defacement, or further attacks on internal networks. Given the popularity of MetaSlider, potentially thousands of websites are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the MetaSlider Responsive Slider plugin to the latest version to patch CVE-2026-39467.</li>
<li>Implement the Sigma rule <code>Detect MetaSlider Object Injection Attempt</code> to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests containing serialized PHP objects to WordPress endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>object-injection</category><category>deserialization</category><category>cve-2026-39467</category></item><item><title>Critical Remote Code Execution Vulnerability in Talend JobServer and Talend Runtime</title><link>https://feed.craftedsignal.io/briefs/2026-04-talend-rce/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-talend-rce/</guid><description>CVE-2026-6264, a critical deserialization vulnerability in Talend JobServer and Runtime, allows unauthenticated remote code execution via the JMX monitoring port, leading to complete system compromise.</description><content:encoded><![CDATA[<p>A critical remote code execution vulnerability, CVE-2026-6264, has been identified in Talend JobServer and Talend Runtime, core components of the Talend data integration platform. Versions affected include Talend JobServer 7.3 (before TPS-6018) and 8.0 (before TPS-6017), as well as Talend Runtime 7.3 (before 7.3.1-R2026-01) and 8.0 (before 8.0.1.R2026-01-RT). The vulnerability stems from insecure deserialization of untrusted data through the JMX monitoring port. Successful exploitation allows an unauthenticated attacker to execute arbitrary code remotely, gain full control over affected systems, access, modify, or delete sensitive data, and disrupt services and data processing workflows. Given the wide deployment of Talend in enterprise settings, this vulnerability poses a significant risk to critical data pipelines.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable Talend JobServer or Runtime instance with an exposed JMX monitoring port.</li>
<li>The attacker crafts a malicious serialized Java object containing arbitrary code.</li>
<li>The attacker sends the malicious serialized object to the JMX monitoring port of the target system.</li>
<li>The Talend JobServer or Runtime instance deserializes the malicious object without proper validation.</li>
<li>The deserialization process triggers the execution of the embedded malicious code within the Java Runtime Environment (JRE).</li>
<li>The attacker gains remote code execution on the compromised system.</li>
<li>The attacker leverages their initial access to escalate privileges, potentially gaining root or SYSTEM access.</li>
<li>The attacker can then access, modify, or exfiltrate sensitive data, install backdoors, or disrupt critical services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6264 can lead to complete system compromise, allowing attackers to execute arbitrary code, access sensitive data, and disrupt critical business processes. Given that Talend is often deployed in enterprise environments as part of critical data pipelines, a successful attack could result in widespread compromise across the enterprise, potentially impacting hundreds or thousands of systems and causing significant financial and reputational damage. The CCB has rated this as a critical vulnerability with a CVSS score of 9.8.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Talend JobServer to the latest version (TPS-6018 for 7.3, TPS-6017 for 8.0) to fully mitigate the vulnerability, as described in the advisory.</li>
<li>For Talend Runtime, disable the JobServer JMX monitoring port, particularly on versions prior to R2024-07-RT, as recommended in the advisory.</li>
<li>Deploy the Sigma rule provided below to detect suspicious JMX traffic indicative of CVE-2026-6264 exploitation.</li>
<li>Increase monitoring and detection capabilities to identify any related suspicious activity, as recommended by the CCB.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>deserialization</category><category>talend</category></item><item><title>Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-04-azure-monitor-agent-privilege-escalation/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-azure-monitor-agent-privilege-escalation/</guid><description>CVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.</description><content:encoded><![CDATA[<p>CVE-2026-32192 is a critical vulnerability affecting the Azure Monitor Agent, a component used for collecting monitoring data in Azure environments. This vulnerability stems from the insecure deserialization of untrusted data, allowing an attacker with local access and authorization to escalate their privileges on the affected system. The vulnerability was published on April 14, 2026. An attacker could potentially leverage this to gain higher-level access to the system, potentially leading to further lateral movement or data compromise. Defenders should prioritize patching this vulnerability to prevent exploitation and privilege escalation within their Azure environments. This vulnerability matters because successful exploitation could lead to unauthorized access to sensitive data, system configuration changes, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with the Azure Monitor Agent installed and has local user privileges.</li>
<li>The attacker crafts malicious serialized data designed to exploit the deserialization vulnerability in the Azure Monitor Agent.</li>
<li>The attacker leverages an authorized channel to inject the malicious serialized data into the Azure Monitor Agent&rsquo;s processing pipeline.</li>
<li>The Azure Monitor Agent attempts to deserialize the crafted data without proper validation.</li>
<li>During deserialization, the malicious data triggers the execution of attacker-controlled code.</li>
<li>The attacker-controlled code elevates the attacker&rsquo;s privileges to a higher level, such as SYSTEM or root.</li>
<li>The attacker uses their elevated privileges to perform unauthorized actions, such as installing malware, accessing sensitive data, or modifying system configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32192 allows a local attacker with low privileges to escalate their privileges to SYSTEM or root on the affected machine. This could lead to complete system compromise, including data theft, malware installation, and disruption of services. The impact is significant due to the widespread use of Azure Monitor Agent in Azure environments, making numerous systems potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch released by Microsoft to address CVE-2026-32192 on all systems running the Azure Monitor Agent as soon as possible, as referenced in the vulnerability advisory <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32192">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32192</a>.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Azure Monitor Agent Process Creation&rdquo; to detect potential exploitation attempts by monitoring for unusual process executions initiated by the Azure Monitor Agent.</li>
<li>Enable process creation logging to facilitate the detection of malicious activity stemming from the Azure Monitor Agent based on the rules provided.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32192</category><category>azure</category><category>monitor agent</category><category>privilege escalation</category><category>deserialization</category></item><item><title>Red Hat Quay Deserialization Vulnerability Leads to Remote Code Execution (CVE-2026-32590)</title><link>https://feed.craftedsignal.io/briefs/2026-04-redhat-quay-rce/</link><pubDate>Wed, 08 Apr 2026 18:25:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-redhat-quay-rce/</guid><description>CVE-2026-32590 describes a deserialization vulnerability in Red Hat Quay's handling of resumable container image layer uploads, potentially allowing an attacker to execute arbitrary code on the Quay server by tampering with intermediate data stored in the database.</description><content:encoded><![CDATA[<p>Red Hat Quay is vulnerable to a critical deserialization flaw, identified as CVE-2026-32590. This vulnerability resides in the handling of resumable container image layer uploads. Specifically, the way Quay stores intermediate data in its database during the upload process is susceptible to tampering. An attacker with the ability to manipulate this stored data can leverage this vulnerability to inject malicious serialized objects. When Quay attempts to deserialize this tampered data, it leads to arbitrary code execution within the Quay server&rsquo;s context. This poses a significant risk to the integrity and confidentiality of the container registry. The vulnerability was reported on April 8, 2026, and affects deployments of Red Hat Quay that have not been patched. Successful exploitation allows attackers to gain full control over the Quay server, potentially leading to data breaches, service disruption, and supply chain compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the Quay server&rsquo;s database or the mechanism used to store intermediate data during resumable uploads, potentially through SQL injection or other database vulnerabilities.</li>
<li>The attacker intercepts a container image layer upload request to the Quay server.</li>
<li>The attacker crafts a malicious payload containing a serialized object designed to execute arbitrary code upon deserialization.</li>
<li>The attacker injects the malicious payload into the intermediate data stored in the database associated with the targeted resumable upload.</li>
<li>The Quay server, during the process of resuming the upload, retrieves the tampered intermediate data from the database.</li>
<li>The Quay server attempts to deserialize the data, triggering the execution of the malicious code embedded within the crafted serialized object.</li>
<li>The attacker achieves arbitrary code execution on the Quay server with the privileges of the Quay application.</li>
<li>The attacker leverages the gained access to compromise the entire Quay registry, potentially exfiltrating sensitive data, injecting malicious images, or disrupting the service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32590 allows for arbitrary code execution on the Red Hat Quay server. This can lead to a complete compromise of the container registry, potentially affecting all container images stored within. Depending on the Quay server&rsquo;s configuration and connected systems, this could lead to further lateral movement within the network and compromise of other critical infrastructure. The severity is rated as HIGH with a CVSS score of 7.1, indicating a significant risk. If exploited, organizations could face data breaches, supply chain attacks through compromised container images, and prolonged service outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a fixed version of Red Hat Quay as recommended by Red Hat to address CVE-2026-32590.</li>
<li>Implement database access controls to restrict unauthorized access and modification of the Quay database to prevent tampering with intermediate data.</li>
<li>Deploy a Web Application Firewall (WAF) to inspect and filter potentially malicious payloads in container image layer upload requests to mitigate exploitation attempts.</li>
<li>Enable robust logging and monitoring of database access and deserialization operations within the Quay server to detect suspicious activities related to this vulnerability.</li>
<li>Implement the provided Sigma rule <code>Detect Quay Deserialization Attempt</code> to identify potential exploitation attempts based on process execution and network connections.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-32590</category><category>redhat-quay</category><category>deserialization</category><category>rce</category></item><item><title>IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)</title><link>https://feed.craftedsignal.io/briefs/2026-04-langflow-rce/</link><pubDate>Wed, 08 Apr 2026 01:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-langflow-rce/</guid><description>IBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.</description><content:encoded><![CDATA[<p>IBM Langflow Desktop, a low-code platform designed to build custom LLM applications, is susceptible to a critical vulnerability (CVE-2026-3357) affecting versions 1.6.0 through 1.8.2. The flaw stems from an insecure default setting within the FAISS (Facebook AI Similarity Search) component, which permits the deserialization of untrusted data. This vulnerability allows an authenticated user to execute arbitrary code on the host system. Successful exploitation grants the attacker full control over the Langflow Desktop instance and potentially the underlying system. Due to the ease of exploitation, especially for authenticated users, defenders must prioritize patching or mitigating this issue to prevent potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the vulnerable IBM Langflow Desktop application (versions 1.6.0 through 1.8.2).</li>
<li>The attacker crafts malicious serialized data designed to exploit the insecure deserialization vulnerability in the FAISS component.</li>
<li>The attacker injects the malicious serialized data into the Langflow application, potentially through a manipulated API request or a crafted workflow file.</li>
<li>Langflow Desktop processes the malicious data using the vulnerable FAISS component.</li>
<li>The FAISS component deserializes the untrusted data without proper validation.</li>
<li>During deserialization, the malicious payload is executed, leading to arbitrary code execution within the context of the Langflow Desktop application.</li>
<li>The attacker gains control of the Langflow Desktop application.</li>
<li>The attacker leverages the code execution to escalate privileges, install malware, or exfiltrate sensitive data from the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3357 allows an attacker to execute arbitrary code on the system running IBM Langflow Desktop. This could lead to complete system compromise, including data theft, malware installation, and denial of service. Given the low complexity and the ability to exploit it with authentication, this vulnerability poses a significant risk to organizations using the affected versions of Langflow Desktop. The impact is amplified if the Langflow Desktop instance has access to sensitive data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IBM Langflow Desktop to a patched version that addresses CVE-2026-3357. Refer to IBM&rsquo;s security advisory (<a href="https://www.ibm.com/support/pages/node/7268428">https://www.ibm.com/support/pages/node/7268428</a>) for specific upgrade instructions.</li>
<li>Implement input validation and sanitization measures to prevent the deserialization of untrusted data.</li>
<li>Monitor network traffic for suspicious activity related to Langflow Desktop, such as unexpected API calls or data transfers.</li>
<li>Enable logging for Langflow Desktop and related components, and analyze logs for signs of exploitation.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block attempts to exploit deserialization vulnerabilities in web applications.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-3357</category><category>deserialization</category><category>rce</category><category>langflow</category></item><item><title>NVIDIA DALI Deserialization Vulnerability (CVE-2026-24156)</title><link>https://feed.craftedsignal.io/briefs/2026-04-nvidia-dali-deserialization/</link><pubDate>Tue, 07 Apr 2026 18:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nvidia-dali-deserialization/</guid><description>NVIDIA DALI contains a deserialization of untrusted data vulnerability, identified as CVE-2026-24156, which may lead to arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-24156 describes a deserialization of untrusted data vulnerability within NVIDIA DALI. This vulnerability could allow an attacker to execute arbitrary code on a vulnerable system. According to NVIDIA&rsquo;s advisory, a successful exploit requires local access, a low level of privileges, and user interaction. The CVSS v3.1 score is rated as 7.3 (HIGH). The vulnerability was reported on April 7, 2026. Successful exploitation could allow an attacker to compromise the confidentiality, integrity, and availability of the system. This is a critical vulnerability for systems utilizing NVIDIA DALI, especially those processing external or untrusted data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains local access to a system running NVIDIA DALI, possibly through social engineering or physical access.</li>
<li>The attacker prepares a malicious serialized data object designed to exploit the deserialization vulnerability in DALI.</li>
<li>The attacker leverages user interaction to trigger the deserialization process within DALI, potentially through a crafted input file or command-line argument.</li>
<li>During deserialization, the malicious object executes arbitrary code due to the vulnerability.</li>
<li>The attacker gains control of the DALI process, potentially escalating privileges within the application context.</li>
<li>The attacker uses the compromised DALI process to execute commands on the host operating system.</li>
<li>The attacker compromises the system, potentially installing malware, exfiltrating sensitive data, or causing denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24156 can lead to arbitrary code execution on systems running NVIDIA DALI. This could result in complete system compromise, including data theft, system corruption, and denial of service. Given the CVSS score of 7.3, the impact is considered high, as successful exploitation can severely impact confidentiality, integrity, and availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to the version of NVIDIA DALI that addresses CVE-2026-24156, as described in NVIDIA&rsquo;s advisory.</li>
<li>Implement least privilege principles to limit the impact of potential code execution.</li>
<li>Monitor systems for suspicious process execution originating from DALI processes to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24156</category><category>deserialization</category><category>nvidia</category><category>dali</category></item><item><title>phpBB Arbitrary File Upload Vulnerability (CVE-2019-25685)</title><link>https://feed.craftedsignal.io/briefs/2026-04-phpbb-file-upload/</link><pubDate>Sun, 05 Apr 2026 21:16:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-phpbb-file-upload/</guid><description>phpBB is vulnerable to arbitrary file upload (CVE-2019-25685) by exploiting the plupload functionality and phar:// stream wrapper, allowing authenticated attackers to upload crafted zip files containing serialized PHP objects that execute arbitrary code via the imagick parameter.</description><content:encoded><![CDATA[<p>CVE-2019-25685 is an arbitrary file upload vulnerability affecting phpBB. An authenticated attacker can exploit this vulnerability to upload malicious files by leveraging the plupload functionality and the phar:// stream wrapper. This allows them to upload a crafted ZIP archive that includes serialized PHP objects, leading to arbitrary code execution when these objects are deserialized via the imagick parameter within the attachment settings. Successful exploitation can result in complete server compromise, allowing the attacker to execute arbitrary commands, potentially leading to data theft, website defacement, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the phpBB application.</li>
<li>The attacker crafts a malicious ZIP archive containing serialized PHP objects designed for remote code execution. This archive is designed to be processed by the <code>phar://</code> stream wrapper.</li>
<li>The attacker uploads the crafted ZIP archive through the plupload functionality, potentially disguised as a legitimate attachment type.</li>
<li>The phpBB application processes the uploaded file. The application uses the phar:// stream wrapper to extract the contents of the uploaded ZIP file.</li>
<li>The application deserializes the malicious PHP objects, triggered by the imagick parameter in attachment settings.</li>
<li>Deserialization of the crafted PHP objects leads to arbitrary code execution on the server.</li>
<li>The attacker gains control of the web server, potentially escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2019-25685 allows an attacker to execute arbitrary code on the phpBB server. The attacker could gain complete control of the web server, potentially leading to data theft, website defacement, or denial of service. The impact is significant due to the potential for full system compromise. The number of victims is dependent on the number of phpBB installations exposed and targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for POST requests to attachment upload endpoints containing ZIP archives and the &ldquo;phar://&rdquo; wrapper in request parameters to detect potential exploit attempts. (Log Source: webserver, Rule: phpbb_phar_upload)</li>
<li>Monitor phpBB file upload directories for the creation of unexpected files, particularly PHP scripts or other executable files. (Log Source: file_event, Rule: phpbb_suspicious_file_creation)</li>
<li>Apply available patches or updates for phpBB to address CVE-2019-25685 as soon as possible.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>phpBB</category><category>file-upload</category><category>deserialization</category><category>CVE-2019-25685</category></item><item><title>pyLoad Arbitrary Code Execution via Malicious Session Deserialization</title><link>https://feed.craftedsignal.io/briefs/2026-04-pyload-rce/</link><pubDate>Sat, 04 Apr 2026 06:43:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pyload-rce/</guid><description>pyLoad is vulnerable to arbitrary code execution via an unprotected `storage_folder` configuration option, allowing an attacker with `SETTINGS` and `ADD` permissions to write a malicious pickle payload to the Flask session store and execute arbitrary code upon subsequent HTTP requests.</description><content:encoded><![CDATA[<p>pyLoad, a download manager, is susceptible to arbitrary code execution due to an insecure configuration option related to the storage folder. This vulnerability arises from the incomplete fix for CVE-2026-33509. Specifically, the <code>storage_folder</code> option is not included in the <code>ADMIN_ONLY_OPTIONS</code> set, which allows users with <code>SETTINGS</code> and <code>ADD</code> permissions to modify it. By redirecting downloads to the Flask filesystem session store, an attacker can plant a malicious pickle payload as a predictable session file. Subsequently, any HTTP request containing the corresponding crafted session cookie will trigger the deserialization of the payload, resulting in arbitrary code execution. This issue affects pyLoad versions up to and including 0.5.0b3. The observed exploitation involves manipulating the download directory to write malicious files into the Flask session store, ultimately leading to code execution on the host.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains a non-admin user account with both <code>SETTINGS</code> and <code>ADD</code> permissions in pyLoad.</li>
<li>The attacker uses the <code>/api/set_config_value</code> endpoint to modify the <code>storage_folder</code> option, setting its value to the Flask session store directory: <code>/tmp/pyLoad/flask</code>. This bypasses existing path restrictions.</li>
<li>The attacker calculates the target session filename by computing the MD5 hash of the string &ldquo;session:ATTACKER_SESSION_ID&rdquo;.</li>
<li>The attacker hosts a malicious pickle payload (e.g., <code>92912f771df217fb6fbfded6705dd47c</code>) on a remote server.</li>
<li>The attacker uses the <code>/api/add_package</code> endpoint to add a download package. The download link points to the hosted malicious pickle payload on the attacker&rsquo;s server: <code>http://attacker.com/92912f771df217fb6fbfded6705dd47c</code>. The <code>dest</code> parameter specifies where to store the downloaded file.</li>
<li>pyLoad downloads the malicious pickle payload and saves it to the Flask session store directory, naming it according to the MD5 hash calculated earlier.</li>
<li>The attacker crafts an HTTP request to the pyLoad server, including a cookie named <code>pyload_session_{port}</code> with the value <code>ATTACKER_SESSION_ID</code>.  The port number is derived from the pyLoad configuration.</li>
<li>Upon receiving the request with the crafted cookie, Flask attempts to load the session data from the corresponding file. The <code>cachelib</code> library deserializes the malicious pickle payload using <code>pickle.load()</code>, triggering arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows a non-admin user with SETTINGS and ADD permissions to achieve arbitrary code execution as the pyload service user. This grants the attacker the ability to execute arbitrary commands, read environment variables (potentially exposing API keys and credentials), access the filesystem (including download history and user databases), and potentially pivot to other network resources. The vulnerability requires no authentication to trigger the final stage of exploitation, increasing its severity and potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect attempts to modify the <code>storage_folder</code> configuration option to point to the Flask session directory (<code>/tmp/pyLoad/flask</code>): <code>Suspicious pyLoad Storage Folder Modification</code>.</li>
<li>Apply the suggested fix by adding <code>storage_folder</code> to the <code>ADMIN_ONLY_OPTIONS</code> set in the pyLoad configuration to prevent non-admin users from modifying it.</li>
<li>Block the malicious URLs used to deliver the pickle payload, specifically <code>http://attacker.com/92912f771df217fb6fbfded6705dd47c</code>, at your network perimeter.</li>
<li>Monitor for HTTP requests containing the crafted session cookie (<code>pyload_session_{port}=ATTACKER_SESSION_ID</code>), using a webserver or proxy log source, as it triggers the final stage of the attack.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>pyLoad</category><category>rce</category><category>pickle</category><category>deserialization</category><category>webserver</category></item><item><title>NVIDIA BioNeMo Deserialization Vulnerability (CVE-2026-24164)</title><link>https://feed.craftedsignal.io/briefs/2026-04-nvidia-bionemo-deserialization/</link><pubDate>Tue, 31 Mar 2026 17:17:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-nvidia-bionemo-deserialization/</guid><description>NVIDIA BioNeMo is vulnerable to deserialization of untrusted data (CVE-2026-24164), potentially leading to code execution, denial of service, information disclosure, and data tampering.</description><content:encoded><![CDATA[<p>A deserialization of untrusted data vulnerability has been identified in NVIDIA BioNeMo (CVE-2026-24164). This vulnerability allows a malicious actor to potentially inject arbitrary code, trigger a denial-of-service condition, expose sensitive information, or tamper with data within the BioNeMo environment. The vulnerability stems from BioNeMo&rsquo;s processing of serialized data, which, if crafted maliciously, can lead to unintended code execution or system compromise. The reported CVSS v3.1 score is 8.8, indicating a high severity. The vendor, NVIDIA, has acknowledged the vulnerability, but specific exploitation details and affected versions are not available in the provided source.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an endpoint or functionality within NVIDIA BioNeMo that accepts serialized data as input.</li>
<li>The attacker crafts a malicious serialized object designed to exploit the deserialization vulnerability. This object could contain instructions to execute arbitrary code, read sensitive files, or modify application data.</li>
<li>The attacker sends the malicious serialized object to the vulnerable BioNeMo endpoint. This could be done via a web request, API call, or other data submission mechanism.</li>
<li>BioNeMo attempts to deserialize the received data.</li>
<li>During the deserialization process, the malicious object triggers the execution of attacker-controlled code due to the vulnerability.</li>
<li>The attacker gains control of the BioNeMo application process or underlying server.</li>
<li>The attacker performs malicious actions such as exfiltrating sensitive data, installing malware, or disrupting services.</li>
<li>The attacker achieves their objective, which could include data breach, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24164 can have severe consequences. It could lead to the execution of arbitrary code on the BioNeMo server, allowing attackers to gain unauthorized access and control. Sensitive data processed by BioNeMo could be exposed, leading to a data breach. The vulnerability could also be exploited to cause a denial of service, disrupting BioNeMo&rsquo;s functionality. Data tampering is also a potential consequence, leading to data integrity issues and potentially impacting downstream processes that rely on BioNeMo. The number of potential victims and targeted sectors are unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious POST requests containing serialized data being sent to NVIDIA BioNeMo endpoints, and deploy the Sigma rule <code>Detect Suspicious BioNeMo Deserialization Attempts</code> to detect potential exploitation attempts.</li>
<li>Inspect network traffic for unusual data patterns related to serialization protocols and correlate with BioNeMo activity, to aid in identifying potential exploitation attempts targeting CVE-2026-24164.</li>
<li>Monitor process creation events on servers hosting NVIDIA BioNeMo for unexpected processes being spawned by the BioNeMo application, using the <code>Detect BioNeMo Child Process</code> Sigma rule to catch unexpected child processes.</li>
<li>Apply any available patches or updates released by NVIDIA to address CVE-2026-24164 as soon as they become available. Refer to NVIDIA&rsquo;s security advisory for remediation guidance.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>deserialization</category><category>nvidia</category></item><item><title>Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)</title><link>https://feed.craftedsignal.io/briefs/2026-03-sharepoint-deserialization/</link><pubDate>Fri, 20 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-sharepoint-deserialization/</guid><description>CVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.</description><content:encoded>&lt;p>On March 18, 2026, CISA added CVE-2026-20963, a SharePoint deserialization vulnerability, to its Known Exploited Vulnerabilities catalog, signaling active exploitation in the wild. This vulnerability allows attackers to execute arbitrary code on affected SharePoint servers through the deserialization of untrusted data. Organizations utilizing SharePoint are urged to apply the necessary patches promptly. Beyond patching, it&amp;rsquo;s crucial to conduct a thorough audit of SharePoint assets, particularly…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-20963</category><category>sharepoint</category><category>deserialization</category><category>cisa-kev</category></item><item><title>PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-phpspreadsheet-rce-ssrf/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-phpspreadsheet-rce-ssrf/</guid><description>PhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.</description><content:encoded><![CDATA[<p>PhpSpreadsheet, a widely used PHP library for reading and writing spreadsheet files, is susceptible to a critical vulnerability that can lead to both Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE). The vulnerability stems from insufficient validation of the <code>$filename</code> parameter passed to the <code>IOFactory::load</code> function. When this parameter is user-controlled, attackers can leverage PHP wrappers such as <code>ftp://</code>, <code>phar://</code>, and <code>ssh2.sftp://</code> to bypass the <code>is_file</code> check, leading to malicious file inclusion or arbitrary code execution. This flaw affects versions up to and including 1.30.2, as well as versions 2.0.0 through 5.5.0. Exploitation can occur even if the specified file inside the phar archive does not exist or is not a supported file type, potentially masking the attack. Due to PhpSpreadsheet&rsquo;s widespread use in other popular libraries like <code>maatwebsite/excel</code> and <code>sonata-project/exporter</code>, the impact of this vulnerability is significant.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious phar archive (<code>exploit.xlsx</code>) containing a PHP object with a <code>__destruct</code> method that executes arbitrary code via <code>shell_exec</code>.</li>
<li>The attacker hosts the malicious phar archive on a web server or makes it accessible through other means.</li>
<li>The attacker crafts a request to a vulnerable web application using PhpSpreadsheet, providing a <code>phar://</code> URL (e.g., <code>phar://exploit.xlsx/whatever</code>) as the <code>$filename</code> parameter to <code>IOFactory::load</code>.</li>
<li><code>IOFactory::load</code> attempts to load the file specified in the <code>$filename</code> parameter, which passes through the vulnerable <code>is_file</code> check.</li>
<li>The <code>phar://</code> wrapper triggers PHP&rsquo;s phar extension, which deserializes the metadata within the <code>exploit.xlsx</code> archive.</li>
<li>Deserialization of the malicious PHP object triggers the <code>__destruct</code> method, executing the attacker&rsquo;s arbitrary code via <code>shell_exec</code>, achieving RCE. The code creates <code>/tmp/poc.txt</code> in the example.</li>
<li>Alternatively, the attacker provides an <code>ftp://</code> URL to <code>IOFactory::load</code>, pointing to an attacker-controlled FTP server.</li>
<li>The vulnerable <code>is_file</code> check allows the <code>ftp://</code> connection, leading to an SSRF vulnerability where the server running PhpSpreadsheet connects to the attacker&rsquo;s specified FTP server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a range of severe consequences. Remote Code Execution (RCE) allows an attacker to execute arbitrary commands on the server, potentially leading to complete system compromise. The SSRF vulnerability enables an attacker to probe internal network resources, potentially exposing sensitive information or allowing further attacks on internal systems. Given PhpSpreadsheet&rsquo;s use in numerous web applications and frameworks, a successful attack could impact a large number of users and organizations. Example impact includes attackers gaining initial access to internal applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the suggested mitigations by either checking for PHP wrappers in the filename before calling <code>is_file</code> or by using <code>realpath</code> to ensure a clean absolute path (see code snippets in the advisory).</li>
<li>Deploy the Sigma rule <code>Detect_PhpSpreadsheet_Phar_Wrapper</code> to detect attempts to exploit the RCE vulnerability by monitoring process creation events with command lines containing &ldquo;phar://&rdquo; and <code>php</code>.</li>
<li>Deploy the Sigma rule <code>Detect_PhpSpreadsheet_Ftp_Wrapper</code> to detect attempts to exploit the SSRF vulnerability by monitoring network connections with destination ports on FTP protocol (21) and file paths contain ftp.</li>
<li>Monitor web server logs for requests containing the <code>phar://</code> or <code>ftp://</code> schemes in the filename parameter to <code>IOFactory::load</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>phpspreadsheet</category><category>ssrf</category><category>rce</category><category>php</category><category>deserialization</category></item><item><title>xmldom XML Node Injection via Comment Serialization</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-xmldom-injection/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-xmldom-injection/</guid><description>The xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.</description><content:encoded><![CDATA[<p>The xmldom library is susceptible to XML node injection due to a lack of validation when serializing comment nodes. Versions prior to 0.8.13 and versions between 0.9.0 and 0.9.10 are vulnerable. An attacker can inject arbitrary XML nodes into the serialized output by including comment-breaking sequences (e.g., <code>--&gt;</code>) in the comment data. This allows them to alter the structure of the XML document. Exploitation involves crafting malicious input that leverages the library&rsquo;s DOM construction and serialization flow. It matters because applications using xmldom to process potentially untrusted XML data could be coerced into generating malicious XML structures. The fix requires an opt-in <code>requireWellFormed</code> flag to be enabled when calling <code>serializeToString()</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An application receives untrusted data intended for use in XML comment content.</li>
<li>The application calls <code>createComment(data)</code> in xmldom, passing the untrusted data. The library stores the data without proper validation.</li>
<li>The application constructs an XML document, including the comment node created in the previous step.</li>
<li>The application calls <code>serializeToString()</code> on the XML document to serialize it.</li>
<li>If the untrusted data contains comment-breaking sequences, such as <code>--&gt;</code>, the serializer prematurely terminates the comment.</li>
<li>The serializer injects any subsequent content in the untrusted data as live XML markup.</li>
<li>The application stores, forwards, signs, or hands the serialized XML to another parser.</li>
<li>The downstream consumer trusts the altered XML structure, leading to unintended consequences, such as misconfiguration or security bypass.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to inject arbitrary XML nodes, potentially altering the structure and meaning of generated XML documents. This could lead to misconfiguration, policy bypass, or other security vulnerabilities in applications that rely on the integrity of the XML structure. The vulnerability affects applications that use xmldom to build XML from untrusted input. The number of victims depends on the usage of the vulnerable library and the exposure of applications to untrusted XML data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>@xmldom/xmldom</code> version 0.8.13 or 0.9.10 or later to gain access to the fix.</li>
<li>Audit all calls to <code>serializeToString()</code> and add the <code>{ requireWellFormed: true }</code> option when serializing comments containing potentially untrusted data.</li>
<li>Implement server-side input validation to sanitize comment data by removing comment-breaking sequences like <code>--&gt;</code> before passing it to <code>createComment()</code>.</li>
<li>Deploy the Sigma rule to detect comment injections.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xml</category><category>injection</category><category>deserialization</category><category>vulnerability</category></item><item><title>Pipecat Remote Code Execution via Pickle Deserialization in LivekitFrameSerializer</title><link>https://feed.craftedsignal.io/briefs/2024-01-pipecat-rce/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pipecat-rce/</guid><description>A critical vulnerability, CVE-2025-62373, exists in Pipecat's LivekitFrameSerializer where the deserialize() method uses Python's pickle.loads() on WebSocket data without validation, allowing a malicious WebSocket client to execute arbitrary code on the Pipecat server if LivekitFrameSerializer is explicitly enabled.</description><content:encoded><![CDATA[<p>A critical vulnerability (CVE-2025-62373) exists in Pipecat&rsquo;s <code>LivekitFrameSerializer</code>, an optional, non-default, and now deprecated frame serializer class intended for LiveKit integration. The <code>deserialize()</code> method in <code>src/pipecat/serializers/livekit.py</code> uses Python&rsquo;s <code>pickle.loads()</code> on data received from WebSocket clients without validation or sanitization. This allows a malicious WebSocket client to send a crafted pickle payload to execute arbitrary code on the Pipecat server. While <code>LivekitFrameSerializer</code> is not enabled by default and was deprecated in version 0.0.90 in favor of the safer <code>LiveKitTransport</code> method, it remains in the codebase and could be inadvertently used, posing a severe risk if a Pipecat server is configured to use it and is listening on an external interface.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Pipecat server with an exposed WebSocket endpoint (e.g., listening on 0.0.0.0:8765) using the vulnerable <code>LivekitFrameSerializer</code>.</li>
<li>Attacker crafts a malicious Python pickle payload. This payload contains instructions to execute arbitrary code on the server, using techniques like defining a class with a <code>__reduce__</code> method that calls <code>os.system()</code>.</li>
<li>Attacker establishes a WebSocket connection to the Pipecat server.</li>
<li>Attacker sends the crafted pickle payload as a WebSocket message to the server.</li>
<li>The Pipecat server receives the message and passes the data to the <code>LivekitFrameSerializer.deserialize()</code> method.</li>
<li>The <code>deserialize()</code> method calls <code>pickle.loads()</code> on the attacker-controlled data without proper validation.</li>
<li><code>pickle.loads()</code> deserializes the malicious pickle object, triggering the execution of the attacker&rsquo;s code on the server with the privileges of the Pipecat process.</li>
<li>Attacker achieves remote code execution, potentially leading to full compromise of the server, including data exfiltration, malware installation, or pivoting to other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability, CVE-2025-62373, allows an attacker to achieve remote code execution on the Pipecat server. If an application uses <code>LivekitFrameSerializer</code> and exposes the Pipecat WebSocket server to untrusted networks, an attacker can completely compromise the server. This could lead to the execution of operating system commands, data modification, malware installation, or pivoting to other systems. The vulnerability is critical because any code execution flaw in a real-time communications server context poses a high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately stop using the <code>LivekitFrameSerializer</code> due to its use of unsafe pickle deserialization. Migrate to the recommended <code>LiveKitTransport</code> or other secure methods provided by the Pipecat framework (see Overview).</li>
<li>Update Pipecat to a version &gt;= 0.0.94 to receive the deprecation warning.</li>
<li>If you must support LiveKit integration or binary frame serialization, use safer alternatives like JSON, Protocol Buffers, or MessagePack.</li>
<li>Bind the Pipecat service to localhost (127.0.0.1) whenever possible to prevent external network access as mentioned in the Overview.</li>
<li>Implement authentication and authorization on the WebSocket connection to restrict who can send data to the server, as described in the Mitigation section.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>remote code execution</category><category>deserialization</category><category>pipecat</category></item></channel></rss>