<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Package-Inspection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/package-inspection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/package-inspection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Zarf Path Traversal Vulnerability via Malicious Package Metadata.Name</title><link>https://feed.craftedsignal.io/briefs/2026-04-15-zarf-path-traversal/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-15-zarf-path-traversal/</guid><description>Zarf is vulnerable to path traversal due to insufficient sanitization of the Metadata.Name field in package manifests when using the `zarf package inspect sbom` or `zarf package inspect documentation` commands, potentially leading to arbitrary file write.</description><content:encoded><![CDATA[<p>Zarf, a tool for air-gapped deployments, is susceptible to a path traversal vulnerability (CVE-2026-40090) affecting versions prior to v0.74.2. The vulnerability stems from inadequate sanitization of the <code>Metadata.Name</code> field within Zarf package manifests. When a user employs the <code>zarf package inspect sbom</code> or <code>zarf package inspect documentation</code> commands on an untrusted package, the tool constructs output file paths by concatenating a user-controlled output directory with the package&rsquo;s <code>Metadata.Name</code> field. A malicious actor can craft a Zarf package with a manipulated <code>Metadata.Name</code> containing path traversal sequences (e.g., <code>../../</code>), enabling arbitrary file write capabilities within the permissions of the user running the <code>inspect</code> command. This vulnerability allows attackers to write to locations they control, potentially leading to privilege escalation or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Zarf package.</li>
<li>The attacker modifies the <code>zarf.yaml</code> manifest within the package to include a <code>Metadata.Name</code> field containing path traversal sequences (e.g., <code>../../../../tmp/evil</code>).</li>
<li>The attacker repacks the Zarf package, recalculating checksums if necessary.</li>
<li>The attacker distributes the malicious Zarf package.</li>
<li>A victim user downloads the malicious Zarf package.</li>
<li>The victim executes <code>zarf package inspect sbom --output-dir /tmp &lt;malicious-package.tar.zst&gt;</code> or <code>zarf package inspect documentation --output-dir /tmp &lt;malicious-package.tar.zst&gt;</code>.</li>
<li>Zarf extracts the <code>Metadata.Name</code> from the <code>zarf.yaml</code> file.</li>
<li>Zarf constructs an output path by joining the user-specified output directory (/tmp) with the malicious <code>Metadata.Name</code> (<code>../../../../tmp/evil</code>), resulting in <code>/tmp/../../../../tmp/evil</code>. The tool attempts to write the SBOM or documentation data to this path, resulting in writing the file to <code>/tmp/evil</code>. This allows attackers to write files such as SSH authorized keys, cron jobs, or shell profiles.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files to the file system, limited by the permissions of the user running the <code>zarf package inspect</code> command. This can lead to several critical consequences: privilege escalation by writing to authorized_keys files, arbitrary code execution by writing cron jobs, or persistent compromise by writing to shell profiles. This vulnerability affects users running the <code>zarf package inspect sbom</code> or <code>zarf package inspect documentation</code> command on untrusted packages. The affected packages are go/github.com/zarf-dev/zarf versions &gt;= 0.23.0 and &lt; 0.74.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Zarf to version v0.74.2 or later to patch CVE-2026-40090.</li>
<li>Avoid inspecting unsigned Zarf packages as a workaround until the upgrade is complete, as mentioned in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Zarf Package Inspection with Path Traversal&rdquo; to identify attempts to exploit this vulnerability via command-line arguments.</li>
<li>Monitor file creation events in sensitive directories (e.g., <code>/home/$USER/.ssh</code>, <code>/etc/cron.d</code>) for files created by the zarf binary using the &ldquo;Detect Zarf Arbitrary File Write&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>zarf</category><category>path-traversal</category><category>arbitrary-file-write</category><category>package-inspection</category><category>linux</category></item></channel></rss>