<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Neuroimaging — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/neuroimaging/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 19:25:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/neuroimaging/feed.xml" rel="self" type="application/rss+xml"/><item><title>LORIS Directory Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-loris-traversal/</link><pubDate>Wed, 08 Apr 2026 19:25:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-loris-traversal/</guid><description>LORIS, a neuroimaging research data management web application, is vulnerable to directory traversal (CVE-2026-35446) due to an incorrect order of operations in the FilesDownloadHandler, allowing authenticated attackers to access unauthorized files.</description><content:encoded><![CDATA[<p>LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application designed for data and project management in neuroimaging research. Versions 24.0.0 up to, but not including, 27.0.3 and 28.0.1 contain a directory traversal vulnerability (CVE-2026-35446) in the FilesDownloadHandler. This flaw stems from an incorrect order of operations, potentially enabling an attacker to escape the intended download directories and access sensitive files. Successful exploitation requires authentication and could lead to unauthorized access to sensitive research data. Users are advised to upgrade to versions 27.0.3 or 28.0.1 to mitigate this vulnerability. This vulnerability impacts organizations utilizing LORIS for managing sensitive neuroimaging data, potentially exposing research data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the LORIS web application with valid credentials.</li>
<li>The attacker crafts a malicious HTTP request to the <code>FilesDownloadHandler</code>.</li>
<li>The crafted request includes a manipulated file path designed to traverse directories outside the intended download directory.</li>
<li>The <code>FilesDownloadHandler</code> processes the request with an incorrect order of operations when validating the file path.</li>
<li>The application bypasses the intended directory restrictions due to the flawed validation process.</li>
<li>The attacker gains access to files and directories outside of the designated download directory.</li>
<li>The attacker reads sensitive data, including neuroimaging data, project files, or configuration files.</li>
<li>The attacker may exfiltrate sensitive data for malicious purposes, such as espionage or sale on the dark web.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this directory traversal vulnerability (CVE-2026-35446) in LORIS could lead to unauthorized access to sensitive neuroimaging research data. The number of affected organizations is unknown, but any organization using LORIS versions 24.0.0 to before 27.0.3 and 28.0.1 is potentially vulnerable. The impact includes data breaches, intellectual property theft, and potential compromise of patient privacy if patient data is stored within the LORIS system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LORIS to version 27.0.3 or 28.0.1 to remediate CVE-2026-35446, as indicated in the overview.</li>
<li>Implement the &ldquo;Detect LORIS Directory Traversal Attempt&rdquo; Sigma rule to monitor for suspicious file download requests.</li>
<li>Review web server access logs for unusual file download patterns or attempts to access files outside the intended download directories using the file_event log source to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>directory-traversal</category><category>web-application</category><category>neuroimaging</category></item></channel></rss>