<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Web-Shell — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/web-shell/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 10:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/web-shell/feed.xml" rel="self" type="application/rss+xml"/><item><title>Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunnet-file-upload/</link><pubDate>Sat, 02 May 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunnet-file-upload/</guid><description>A privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>CVE-2026-7490 is an arbitrary file upload vulnerability found in Sunnet CTMS and CPAS. Disclosed in May 2026, this vulnerability enables a privileged attacker to upload malicious files, specifically web shell backdoors, to the affected server. This can be achieved remotely, without requiring local system access, given the attacker already possesses valid privileged credentials for the application. Successful exploitation allows the attacker to execute arbitrary code on the server, potentially leading to complete system compromise. This vulnerability poses a significant threat to organizations using these Sunnet products, as it could result in data breaches, service disruption, and other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains privileged access to the CTMS or CPAS application, either through credential theft, phishing, or other means.</li>
<li>Attacker identifies the file upload functionality within the application.</li>
<li>Attacker crafts a malicious file, such as a PHP web shell, designed to execute arbitrary commands on the server.</li>
<li>Attacker bypasses any client-side file type validation mechanisms.</li>
<li>Attacker uploads the malicious file to the server through the vulnerable file upload endpoint.</li>
<li>The application saves the file to a publicly accessible directory without proper sanitization or validation.</li>
<li>Attacker accesses the uploaded web shell via a web browser.</li>
<li>Attacker uses the web shell to execute arbitrary commands on the server, leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7490 allows attackers to execute arbitrary code on the affected server. This can lead to a range of malicious activities, including data theft, modification, or destruction, installation of malware, and complete system takeover. Since the vulnerability affects CTMS and CPAS, organizations in sectors utilizing these systems for content or process management are particularly at risk. The vulnerability&rsquo;s high severity allows attackers to quickly gain a foothold and potentially compromise sensitive information or disrupt business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates from Sunnet to address CVE-2026-7490.</li>
<li>Implement the Sigma rule <code>Detect Malicious File Uploads to Web Servers</code> to detect suspicious file uploads based on file extensions and content.</li>
<li>Review and harden file upload functionalities within CTMS and CPAS to prevent arbitrary file uploads.</li>
<li>Monitor web server logs for access to suspicious files in upload directories, using the <code>Web Shell Access</code> Sigma rule.</li>
<li>Restrict access to file upload functionalities to only authorized users with appropriate privileges.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>arbitrary-file-upload</category><category>web-shell</category><category>code-execution</category></item><item><title>Borg SPM 2007 Arbitrary File Upload Vulnerability (CVE-2026-6885)</title><link>https://feed.craftedsignal.io/briefs/2026-04-borg-spm-file-upload/</link><pubDate>Thu, 23 Apr 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-borg-spm-file-upload/</guid><description>An unauthenticated remote attacker can exploit an arbitrary file upload vulnerability (CVE-2026-6885) in Borg SPM 2007 to upload and execute web shell backdoors, leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>Borg SPM 2007, a product by BorG Technology Corporation with sales ending in 2008, is vulnerable to arbitrary file uploads (CVE-2026-6885). This vulnerability allows unauthenticated remote attackers to upload malicious files, such as web shells, which can then be executed by the server. The attacker can then achieve arbitrary code execution, leading to a compromise of the system. Given the age of the software, it is likely running on outdated systems with fewer security controls making successful exploitation highly probable. This poses a significant risk to organizations still using this software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Borg SPM 2007 server exposed to the internet.</li>
<li>The attacker sends a crafted HTTP POST request to the server, exploiting the file upload vulnerability (CVE-2026-6885).</li>
<li>The POST request contains a malicious file, such as a PHP web shell, disguised with a permissible extension or without any extension check.</li>
<li>The Borg SPM 2007 server saves the uploaded file to a publicly accessible directory, without proper sanitization.</li>
<li>The attacker sends another HTTP request to access the uploaded web shell.</li>
<li>The web server executes the web shell code, granting the attacker arbitrary code execution on the server.</li>
<li>The attacker uses the web shell to gain a persistent foothold, install malware, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the vulnerable server. This can lead to full system compromise, data theft, and potential disruption of services. While the number of active installations is likely low due to the product&rsquo;s end-of-life status in 2008, organizations still running Borg SPM 2007 are at high risk if the system is exposed to the Internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify instances of Borg SPM 2007 running in your environment and isolate them from the network if possible.</li>
<li>Implement the provided Sigma rule to detect potential web shell uploads based on HTTP request characteristics.</li>
<li>Since no patch exists, consider immediate decommissioning or migration to a supported alternative.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>file-upload</category><category>web-shell</category><category>code-execution</category></item><item><title>FlowiseAI File Upload Validation Bypass Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-17-flowise-upload-bypass/</link><pubDate>Fri, 17 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-17-flowise-upload-bypass/</guid><description>A file upload validation bypass vulnerability exists in FlowiseAI, where the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type, enabling an attacker to upload .js files, store malicious Node.js web shells on the server, and potentially achieve Remote Code Execution (RCE).</description><content:encoded><![CDATA[<p>FlowiseAI, a low-code platform for building AI applications, contains a file upload validation bypass vulnerability. By modifying the Chatflow configuration, specifically the <code>allowedUploadFileTypes</code> setting, an attacker can add <code>application/javascript</code> as an accepted MIME type. This bypasses previous mitigations (CVE-2025-61687) intended to prevent the upload of potentially malicious files. Although the frontend UI restricts JavaScript uploads, a direct API request can circumvent this. Successful exploitation allows attackers to persistently store Node.js web shells (e.g., shell.js) on the Flowise server. This vulnerability affects FlowiseAI versions up to 3.0.13. If executed, these web shells could grant the attacker Remote Code Execution (RCE) capabilities on the server, posing a significant risk to system integrity and data confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FlowiseAI instance running a version &lt;= 3.0.13.</li>
<li>The attacker authenticates to the FlowiseAI instance as an administrator or with compromised credentials.</li>
<li>The attacker crafts a malicious HTTP PUT request to the <code>/api/v1/chatflows/{CHATFLOW_ID}</code> endpoint.</li>
<li>The PUT request modifies the Chatflow configuration, specifically the <code>chatbotConfig</code> to include <code>application/javascript</code> in the <code>allowedUploadFileTypes</code>.</li>
<li>The attacker crafts a malicious HTTP POST request to the <code>/api/v1/attachments/{CHATFLOW_ID}/{CHAT_ID}</code> endpoint to upload a <code>.js</code> file (Node.js web shell), such as the <code>shell.js</code> example.</li>
<li>The server saves the malicious <code>.js</code> file to a publicly accessible directory.</li>
<li>The attacker accesses the uploaded <code>.js</code> file via a direct HTTP request.</li>
<li>The web shell executes commands specified in the URL parameters, such as <code>http://localhost:8888/?cmd=id</code>, resulting in RCE.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to upload and persistently store malicious web shells on the FlowiseAI server. Execution of these web shells grants the attacker the ability to execute arbitrary commands on the underlying system. This can lead to complete system compromise, data exfiltration, and denial of service. This vulnerability affects FlowiseAI versions up to 3.0.13.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to prevent modification of <code>allowedUploadFileTypes</code> settings.</li>
<li>Monitor network traffic for PUT requests to <code>/api/v1/chatflows/{CHATFLOW_ID}</code> modifying <code>allowedUploadFileTypes</code> as described in the attack chain.</li>
<li>Monitor for POST requests to <code>/api/v1/attachments/{CHATFLOW_ID}/{CHAT_ID}</code> uploading <code>.js</code> files based on the attack chain.</li>
<li>Deploy the Sigma rules provided below to detect suspicious HTTP requests indicative of this attack.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>flowiseai</category><category>file-upload</category><category>rce</category><category>web-shell</category></item><item><title>Potential Web Shell ASPX File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-12-potential-web-shell-aspx-file-creation/</link><pubDate>Sat, 14 Dec 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-potential-web-shell-aspx-file-creation/</guid><description>The creation of ASPX files in web server directories, excluding legitimate processes, indicates potential web shell deployment for persistence on Windows systems.</description><content:encoded><![CDATA[<p>Attackers frequently deploy web shells to maintain persistence and execute arbitrary commands on compromised web servers. This rule identifies the creation of ASPX files, commonly used in Windows environments, within directories typically targeted for web shell deployment. The rule focuses on the &ldquo;?:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\*&rdquo; path, a common location for web server extensions and potential web shell placements. By excluding legitimate processes such as msiexec.exe and psconfigui.exe, the rule aims to detect suspicious ASPX file creation events indicative of malicious activity. The detection logic helps defenders identify potential web shell installations, allowing for timely response and remediation to prevent further compromise. This activity has been observed in exploitation attempts targeting SharePoint servers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through exploiting a vulnerability in a web application or service running on the server (e.g., SharePoint).</li>
<li>The attacker leverages the compromised web application to upload a malicious ASPX file to a directory within the web server&rsquo;s file system, specifically targeting locations like &ldquo;?:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\*&rdquo;.</li>
<li>The uploaded ASPX file contains malicious code designed to provide the attacker with remote access and control over the server.</li>
<li>The attacker triggers the execution of the ASPX file by sending a request to the web server, which processes the ASPX file and executes the embedded malicious code.</li>
<li>The web shell allows the attacker to execute arbitrary commands on the server, potentially escalating privileges and moving laterally within the network.</li>
<li>The attacker uses the web shell to establish persistence on the compromised server, ensuring continued access even after the initial vulnerability is patched.</li>
<li>The attacker may use the web shell to exfiltrate sensitive data from the server or to deploy additional malware and tools.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful web shell deployment can lead to complete compromise of the affected server, potentially impacting numerous organizations. Attackers can use web shells to execute arbitrary code, steal sensitive data, and establish persistent access to internal networks. The impact includes data breaches, financial losses, and reputational damage. Successful exploitation of SharePoint vulnerabilities leading to web shell deployment has been observed in the wild.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Web Shell ASPX File Creation in Common Directories&rdquo; to detect suspicious ASPX file creation events, filtering out legitimate processes to reduce false positives.</li>
<li>Enable Sysmon Event ID 11 (File Create) to capture file creation events on Windows systems, which is a data source for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Web Shell ASPX File Creation in Common Directories&rdquo; by examining the file path, creating process, and network activity around the time of the event.</li>
<li>Monitor web server logs for suspicious requests targeting ASPX files in common web server directories, as referenced in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>web-shell</category><category>persistence</category><category>windows</category></item><item><title>Uncommon Destination Port Connection by Web Server on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-uncommon-web-server-port/</link><pubDate>Tue, 09 Jan 2024 18:28:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uncommon-web-server-port/</guid><description>The rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying potentially malicious activity stemming from Linux-based web servers. The rule is triggered when a web server process, such as Apache, Nginx, or others, initiates an outbound network connection to a destination port that is considered non-standard. This activity can signal the presence of a web shell, a malicious script uploaded to a web server to enable remote access and control. Attackers may exploit compromised web servers to establish covert communication channels, exfiltrate data, or launch further attacks on internal systems. The rule leverages data from Elastic Defend to monitor network connections and filter out legitimate traffic based on a predefined list of common ports and internal IP ranges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained via exploitation of a vulnerability in a web application or web server component running on a Linux system (e.g., through SQL injection or remote code execution).</li>
<li>A web shell is uploaded to the compromised web server, often disguised as a legitimate file or hidden within existing directories.</li>
<li>The attacker interacts with the web shell through HTTP requests, using it as a command and control interface.</li>
<li>The web shell executes commands on the server, initiating outbound network connections to non-standard ports.</li>
<li>These connections may be used to communicate with external C2 servers, download additional payloads, or exfiltrate sensitive data.</li>
<li>The attacker uses the web shell to move laterally within the network, targeting other systems and services.</li>
<li>The attacker attempts to establish persistence on the compromised server, ensuring continued access even after system reboots.</li>
<li>The final objective is data theft, system compromise, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised web servers can lead to significant data breaches, system downtime, and reputational damage. While this rule triggers on low-severity behavior, successful exploitation can lead to complete system compromise. The number of affected systems depends on the scope of the initial vulnerability and the attacker&rsquo;s ability to move laterally. Organizations in all sectors that rely on web-based applications are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect web server processes initiating connections to unusual destination ports and tune for your environment.</li>
<li>Enable Elastic Defend integration to collect the necessary network event data from Linux endpoints to activate the rule.</li>
<li>Review and customize the list of excluded destination ports and internal IP ranges in the Sigma rule to match your organization&rsquo;s specific network configuration and legitimate traffic patterns.</li>
<li>Investigate any alerts generated by the rule to determine if the activity is malicious or benign, focusing on the process name, user, destination IP, and destination port.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>command-and-control</category><category>web shell</category><category>linux</category></item></channel></rss>