<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gzip — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/gzip/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 01:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/gzip/feed.xml" rel="self" type="application/rss+xml"/><item><title>SecureDrop Client Code Execution via Gzip Extraction Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-securedrop-gzip-vuln/</link><pubDate>Sat, 18 Apr 2026 01:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-securedrop-gzip-vuln/</guid><description>A compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.</description><content:encoded><![CDATA[<p>SecureDrop Client, a desktop application designed for secure communication between journalists and sources, is vulnerable to code execution (versions 0.17.4 and below). The vulnerability, identified as CVE-2026-35465, stems from improper filename validation during the extraction of gzip archives. A compromised SecureDrop Server can leverage this flaw to overwrite critical files, such as the SQLite database, on the Client&rsquo;s virtual machine (sd-app). While exploiting this vulnerability requires prior compromise of the hardened SecureDrop Server (accessible only via Tor), successful exploitation leads to significant impact on the confidentiality, integrity, and availability of sensitive source submissions. This issue is similar to CVE-2025-24888, but arises through a different code path. Version 0.17.5 addresses this vulnerability with a more robust fix within the replacement SecureDrop Inbox codebase.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises the SecureDrop Server, gaining control over its file handling processes.</li>
<li>Attacker crafts a malicious gzip archive containing filenames with absolute paths (e.g., <code>/opt/securedrop/client/db.sqlite</code>).</li>
<li>Attacker uploads this malicious gzip archive to the compromised SecureDrop Server.</li>
<li>The SecureDrop Client retrieves the malicious gzip archive from the SecureDrop Server via Tor.</li>
<li>The SecureDrop Client attempts to extract the contents of the gzip archive using a vulnerable extraction routine.</li>
<li>Due to improper filename validation, the extraction process overwrites critical files, such as the SQLite database, on the client&rsquo;s virtual machine (sd-app).</li>
<li>The attacker achieves code execution by manipulating the overwritten files to execute arbitrary code upon the next application startup or during normal operation.</li>
<li>The attacker gains unauthorized access to decrypted source submissions and can exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35465 allows a compromised SecureDrop Server to execute arbitrary code on the SecureDrop Client&rsquo;s virtual machine. This leads to a complete breach of confidentiality, integrity, and availability of decrypted source submissions handled by the client. Journalists relying on SecureDrop could have their sources exposed, leading to severe repercussions for both journalists and their sources. The impact is limited to SecureDrop deployments running vulnerable versions (0.17.4 and below).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all SecureDrop Client installations to version 0.17.5 or later to remediate CVE-2026-35465.</li>
<li>Monitor SecureDrop Client systems for unusual file writes, especially to critical directories such as <code>/opt/securedrop/client/</code> using the provided Sigma rule.</li>
<li>Review and harden the SecureDrop Server&rsquo;s security configuration to prevent initial compromise, as exploitation requires prior access to the server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>securedrop</category><category>gzip</category><category>code execution</category><category>vulnerability</category><category>linux</category></item></channel></rss>