<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sleuth Kit — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sleuth-kit/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 22:16:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sleuth-kit/feed.xml" rel="self" type="application/rss+xml"/><item><title>Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-sleuthkit-pathtraversal/</link><pubDate>Wed, 08 Apr 2026 22:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-sleuthkit-pathtraversal/</guid><description>A path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.</description><content:encoded><![CDATA[<p>The Sleuth Kit, a collection of command-line tools for forensic analysis of disk images, is susceptible to a path traversal vulnerability (CVE-2026-40024) affecting versions up to 4.14.0. This vulnerability resides within the <code>tsk_recover</code> utility, which is designed to recover files from disk images. An attacker can exploit this flaw by crafting a malicious filesystem image containing filenames or directory paths with path traversal sequences (e.g., <code>../</code>). When <code>tsk_recover</code> processes this image, it can be tricked into writing files to arbitrary locations outside the intended recovery directory. Successful exploitation allows attackers to overwrite critical system files, such as shell configuration files or cron entries, ultimately leading to code execution with elevated privileges. This vulnerability poses a significant risk to systems utilizing The Sleuth Kit for forensic investigations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious filesystem image. This image contains filenames or directory paths embedded with path traversal sequences like <code>../</code>.</li>
<li>The attacker, or a user under their control, invokes the <code>tsk_recover</code> utility on a vulnerable system, specifying the malicious filesystem image as input.</li>
<li><code>tsk_recover</code> parses the filesystem image and encounters the crafted filenames with path traversal sequences.</li>
<li>Due to the vulnerability, <code>tsk_recover</code> incorrectly resolves the file paths, allowing the write operation to escape the intended recovery directory.</li>
<li>The utility writes a file to an arbitrary location on the file system. This location is determined by the attacker-controlled path traversal sequences.</li>
<li>The attacker strategically targets critical system files for overwriting, such as shell configuration files (<code>.bashrc</code>, <code>.bash_profile</code>) or cron entries (<code>/etc/cron.d/</code>).</li>
<li>Upon the next user login or scheduled cron job execution, the attacker&rsquo;s malicious code embedded in the overwritten files is executed.</li>
<li>The attacker achieves code execution, potentially gaining persistence or escalating privileges on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files to the target system, potentially leading to code execution. By overwriting shell configuration files or cron entries, attackers can gain persistence and escalate their privileges, effectively taking control of the system. While the specific number of victims is unknown, any system utilizing a vulnerable version of The Sleuth Kit for disk image analysis is at risk. The impact could range from data theft to complete system compromise, depending on the attacker&rsquo;s objectives and the level of access gained.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade The Sleuth Kit to a version beyond 4.14.0 to patch CVE-2026-40024 and eliminate the path traversal vulnerability.</li>
<li>Monitor process execution for instances of <code>tsk_recover</code> writing files outside the intended recovery directory using the Sigma rule <code>Detect Sleuth Kit Path Traversal</code>.</li>
<li>Implement file integrity monitoring for critical system files (e.g., <code>.bashrc</code>, <code>.bash_profile</code>, <code>/etc/cron.d/*</code>) to detect unauthorized modifications resulting from exploitation of CVE-2026-40024.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>code execution</category><category>privilege escalation</category><category>sleuth kit</category><category>CVE-2026-40024</category></item></channel></rss>