<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Uac — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/uac/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 22:16:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/uac/feed.xml" rel="self" type="application/rss+xml"/><item><title>UAC (Unix-like Artifacts Collector) Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-command-injection/</link><pubDate>Wed, 08 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-command-injection/</guid><description>UAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.</description><content:encoded><![CDATA[<p>UAC (Unix-like Artifacts Collector) before version 3.3.0-rc1 is susceptible to a command injection vulnerability. This flaw resides in the placeholder substitution and command execution pipeline within the application. Specifically, the <code>_run_command()</code> function directly passes constructed command strings to <code>eval</code> without proper sanitization. This lack of input validation allows attackers to inject malicious shell metacharacters or command substitutions into the command strings. Exploitation is possible through attacker-controlled inputs such as <code>%line%</code> values from <code>foreach</code> iterators and <code>%user%</code> / <code>%user_home%</code> values derived from system files. Successful exploitation leads to arbitrary command execution with the same privileges as the UAC process. This poses a significant risk to system integrity and confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable UAC instance running a version prior to 3.3.0-rc1.</li>
<li>Attacker crafts a malicious input string containing shell metacharacters or command substitutions, targeting either <code>%line%</code> values in <code>foreach</code> iterators, or the <code>%user%</code> and <code>%user_home%</code> values.</li>
<li>The attacker-controlled input is passed to UAC, potentially via a configuration file, command-line argument, or other input mechanism.</li>
<li>UAC&rsquo;s <code>_run_command()</code> function receives the malicious input and performs placeholder substitution.</li>
<li>The resulting command string, now containing the injected commands, is passed to the <code>eval</code> function without proper sanitization.</li>
<li>The <code>eval</code> function executes the attacker-injected commands with the privileges of the UAC process.</li>
<li>The attacker gains arbitrary code execution on the system.</li>
<li>The attacker can then perform actions such as data exfiltration, system compromise, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The command injection vulnerability in UAC before 3.3.0-rc1 allows attackers to execute arbitrary commands on the affected system. The impact of successful exploitation includes complete system compromise, data breaches, and potential for lateral movement to other systems within the network. Since UAC is used to collect artifacts, successful exploitation could lead to the collection of sensitive data from the compromised system, which could then be exfiltrated. The specific number of potential victims is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade UAC to version 3.3.0-rc1 or later to patch CVE-2026-40032.</li>
<li>Implement input validation and sanitization for all user-supplied input, particularly those used in command construction and execution, to prevent command injection vulnerabilities.</li>
<li>Monitor process execution for unexpected or unauthorized commands originating from the UAC process, using the Sigma rules provided below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>uac</category></item></channel></rss>