<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lua — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/lua/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 14:16:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/lua/feed.xml" rel="self" type="application/rss+xml"/><item><title>Libinput Code Injection Vulnerability via Malicious Lua Bytecode (CVE-2026-35093)</title><link>https://feed.craftedsignal.io/briefs/2026-04-libinput-code-injection/</link><pubDate>Wed, 01 Apr 2026 14:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-libinput-code-injection/</guid><description>A local attacker can exploit CVE-2026-35093 in libinput by placing a specially crafted Lua bytecode file in configuration directories, allowing arbitrary code execution with the privileges of the application using libinput.</description><content:encoded><![CDATA[<p>CVE-2026-35093 describes a code injection vulnerability within the libinput library. This flaw allows a local attacker with the ability to write files to specific system or user configuration directories to bypass security restrictions. By placing a maliciously crafted Lua bytecode file in these directories, an attacker can inject and execute arbitrary code. The injected code runs with the same privileges as the application using libinput, often a graphical compositor. This vulnerability was reported on April 1, 2026, and impacts systems where libinput is used to handle input devices. Successful exploitation can lead to significant compromise of the affected system, allowing attackers to perform actions such as keylogging or further escalating privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system with the ability to write files to the filesystem.</li>
<li>The attacker identifies a system or user configuration directory that libinput reads Lua bytecode files from.</li>
<li>The attacker crafts a malicious Lua bytecode file designed to execute arbitrary code. This file exploits the vulnerability in libinput&rsquo;s bytecode parsing.</li>
<li>The attacker places the malicious Lua bytecode file into the identified configuration directory.</li>
<li>The graphical compositor or other application using libinput loads and parses the malicious Lua bytecode file.</li>
<li>The vulnerability in libinput is triggered, causing the malicious code within the bytecode file to be executed.</li>
<li>The attacker&rsquo;s code executes with the same privileges as the application using libinput, gaining control over the compositor.</li>
<li>The attacker leverages the elevated privileges to monitor keyboard input, potentially stealing credentials or other sensitive information, and exfiltrates data to an external server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35093 allows a local attacker to execute arbitrary code with elevated privileges. This can lead to the compromise of sensitive data, such as keystrokes and credentials, as well as the potential for further system compromise. Given that libinput is used by many graphical compositors and other applications that handle input devices, a successful attack could impact a large number of systems. The impact includes data theft, privilege escalation, and the installation of persistent backdoors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Lua Bytecode File Creation</code> to identify the creation of suspicious Lua bytecode files in configuration directories (logsource: <code>file_event</code>, rule title: <code>Detect Suspicious Lua Bytecode File Creation</code>).</li>
<li>Monitor file creation events in libinput configuration directories for files with the <code>.lua</code> extension using file integrity monitoring tools.</li>
<li>Apply any available patches for libinput to address CVE-2026-35093 as soon as they are released.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libinput</category><category>code-injection</category><category>lua</category><category>cve-2026-35093</category></item><item><title>Contour HTTPProxy Lua Code Injection via Cookie Path Rewrite</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-contour-lua-injection/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-contour-lua-injection/</guid><description>Contour's Cookie Rewriting feature is vulnerable to Lua code injection; an attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in the `spec.routes[].cookieRewritePolicies[].pathRewrite.value` or `spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value` fields, resulting in arbitrary code execution in the Envoy proxy.</description><content:encoded><![CDATA[<p>Project Contour is susceptible to Lua code injection within its cookie rewriting functionality. The vulnerability arises from insufficient sanitization when user-controlled values are interpolated into Lua source code using Go&rsquo;s <code>text/template</code>. This affects Contour versions 1.19.0 through 1.33.3. An attacker with the ability to create or modify <code>HTTPProxy</code> resources can inject arbitrary Lua code by crafting malicious values in <code>spec.routes[].cookieRewritePolicies[].pathRewrite.value</code> or <code>spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value</code>. While the injected code executes within the attacker&rsquo;s own route, the shared nature of the Envoy proxy allows for potential escalation of privileges, including reading Envoy&rsquo;s xDS client credentials and causing denial of service for other tenants. This vulnerability is resolved in Contour versions v1.33.4, v1.32.5, and v1.31.6.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains RBAC permissions to create or modify <code>HTTPProxy</code> resources within the Contour environment.</li>
<li>The attacker crafts a malicious <code>HTTPProxy</code> resource containing a <code>cookieRewritePolicies</code> section.</li>
<li>Within the <code>cookieRewritePolicies</code>, the attacker injects Lua code into the <code>pathRewrite.value</code> field.</li>
<li>The attacker applies the crafted <code>HTTPProxy</code> resource, deploying the malicious configuration to Contour.</li>
<li>Contour, using the Envoy proxy, processes the <code>HTTPProxy</code> resource, interpolating the attacker-controlled value into the Lua filter.</li>
<li>When traffic is processed on the attacker&rsquo;s route, the injected Lua code executes within the Envoy proxy.</li>
<li>The injected Lua code attempts to read Envoy&rsquo;s xDS client credentials from the filesystem.</li>
<li>The attacker uses the obtained xDS client credentials to read all Contour xDS configuration, including TLS certificates and private keys of other tenants, or to cause a denial of service for other tenants sharing the Envoy instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful exploit allows attackers to execute arbitrary code within the Envoy proxy, potentially leading to credential theft and denial of service. Specifically, an attacker can steal TLS certificates and private keys of other tenants within the Contour environment. This could compromise sensitive data and disrupt services. If xDS credentials can be obtained, an attacker can then modify/exfiltrate service mesh configuration details.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Contour to version v1.33.4, v1.32.5, or v1.31.6 to remediate the Lua code injection vulnerability as described in the overview.</li>
<li>Monitor HTTPProxy resource creation and modification events for suspicious patterns or unexpected values in the <code>spec.routes[].cookieRewritePolicies[].pathRewrite.value</code> and <code>spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value</code> fields.</li>
<li>Implement RBAC least privilege principles to restrict access to creating and modifying <code>HTTPProxy</code> resources, mitigating the initial access vector required to exploit this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>contour</category><category>lua</category><category>code-injection</category><category>httpproxy</category><category>cve-2026-41246</category></item></channel></rss>