<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sharp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sharp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 18:03:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sharp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Authenticated Sharp Users Can Download Unrelated Laravel Storage Objects</title><link>https://feed.craftedsignal.io/briefs/2026-05-sharp-laravel-storage-disclosure/</link><pubDate>Fri, 15 May 2026 18:03:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sharp-laravel-storage-disclosure/</guid><description>An authenticated Sharp user with view access to at least one valid Sharp entity instance can download unrelated files from configured Laravel Storage disks by manipulating the `disk` and `path` parameters in the generic download endpoint, potentially exposing sensitive data like backups and internal documents; this vulnerability is tracked as CVE-2026-44692.</description><content:encoded><![CDATA[<p>The Sharp package for Laravel exposes a generic download endpoint that improperly authorizes access to storage objects. An authenticated user who has access to at least one valid Sharp entity instance can exploit this vulnerability (CVE-2026-44692) to download unrelated files from Laravel Storage disks. The application authorizes based on the Sharp entity instance, but then reads the storage <code>disk</code> and <code>path</code> directly from the request parameters, meaning there&rsquo;s no binding between the authorized entity and the requested storage object. This allows attackers to bypass intended access controls and potentially access sensitive files stored on configured Laravel Storage disks. Successful exploitation requires a valid Sharp session and view access to one valid entity. Versions prior to 9.22.0 are affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Sharp application with valid credentials.</li>
<li>Attacker identifies a valid Sharp entity instance to which they have view access.</li>
<li>Attacker crafts a request to the <code>/sharp/{globalFilter}/download/{entityKey}/{instanceId?}</code> endpoint.</li>
<li>The attacker modifies the <code>disk</code> and <code>path</code> parameters in the request to point to a different file within the configured Laravel Storage disks.</li>
<li>The application authorizes the request based on the valid Sharp entity instance, but doesn&rsquo;t validate the requested <code>disk</code> or <code>path</code> against that instance.</li>
<li>The application retrieves the file specified by the manipulated <code>disk</code> and <code>path</code> parameters from the Laravel Storage disk.</li>
<li>The application sends the contents of the unrelated file to the attacker.</li>
<li>The attacker gains unauthorized access to potentially sensitive information, such as backups, invoices, or internal documents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44692 can lead to the authenticated disclosure of unrelated objects from configured Laravel Storage disks. Exposed files may include exports, backups, invoices, internal documents, uploads belonging to other records, tenant-specific data, or operational files stored on private application disks. The severity of the impact depends on the sensitivity of the data stored on the affected Laravel Storage disks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to composer/code16/sharp version 9.22.0 or later, which includes a fix for CVE-2026-44692.</li>
<li>Restrict <code>downloads.allowed_disks</code> to the smallest possible set of disks required by Sharp downloads, as mentioned in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Sharp Laravel Storage Download Endpoint Abuse&rdquo; to identify requests that may be exploiting this vulnerability.</li>
<li>Monitor web server logs for requests to the <code>/sharp/{globalFilter}/download/{entityKey}/{instanceId?}</code> endpoint where the <code>disk</code> or <code>path</code> parameters deviate significantly from expected values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authenticated-disclosure</category><category>web-application</category><category>laravel</category><category>sharp</category></item></channel></rss>