<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Zip-Slip — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/zip-slip/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 17:39:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/zip-slip/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenMRS Module Upload Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</link><pubDate>Mon, 04 May 2026 17:39:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openmrs-zip-slip/</guid><description>OpenMRS versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, are vulnerable to a path traversal (Zip Slip) attack via the `POST /openmrs/ws/rest/v1/module` endpoint that allows authenticated attackers to achieve arbitrary file write and remote code execution.</description><content:encoded><![CDATA[<p>OpenMRS, an open-source enterprise electronic medical record system platform, is vulnerable to a path traversal (Zip Slip) vulnerability in its module upload functionality. Discovered in versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, the vulnerability resides in the <code>POST /openmrs/ws/rest/v1/module</code> endpoint. An authenticated attacker with administrative privileges can exploit this flaw by uploading a specially crafted <code>.omod</code> archive containing malicious ZIP entries with directory traversal sequences. This can allow the attacker to write files outside of the intended module directory, potentially leading to arbitrary file write and remote code execution on the server. The vulnerability stems from incomplete path validation within the <code>WebModuleUtil.startModule()</code> function, an oversight compared to other extraction methods within the same codebase that are properly protected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the OpenMRS instance with valid admin credentials via Basic Auth.</li>
<li>The attacker crafts a malicious <code>.omod</code> file containing a ZIP entry with a path traversal payload, such as <code>web/module/../../../../&lt;target_filename&gt;.jsp</code>.</li>
<li>The attacker sends a <code>POST</code> request to the <code>/openmrs/ws/rest/v1/module</code> endpoint, uploading the malicious <code>.omod</code> file.</li>
<li>The server receives the request and parses the uploaded <code>.omod</code> file, treating it as a ZIP archive.</li>
<li>During module loading via <code>WebModuleUtil.startModule()</code>, the server extracts entries under the <code>web/module/</code> directory.</li>
<li>Due to an incomplete check, the entry <code>web/module/../../../../&lt;target_filename&gt;.jsp</code> passes the initial validation.</li>
<li>The server attempts to write the extracted file to a path constructed by concatenating the traversed path, resulting in writing the file outside the intended <code>WEB-INF/view/module/</code> directory.</li>
<li>If the written file is a JSP script, accessing it via a browser triggers server-side execution, achieving Remote Code Execution (RCE).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files within the web application root directory of the OpenMRS instance. This can lead to remote code execution, allowing the attacker to gain complete control of the affected server. Given OpenMRS&rsquo;s use in healthcare environments, a successful attack could compromise sensitive patient data, disrupt medical operations, and damage the reputation of the affected organization. The number of potentially affected installations is unknown, but the vulnerability impacts a widely used version of the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of OpenMRS that includes the fix for CVE-2026-40076 to address the path traversal vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect OpenMRS Malicious Module Upload</code> to identify exploitation attempts based on HTTP requests to the <code>/openmrs/ws/rest/v1/module</code> endpoint with suspicious file extensions in the query parameters.</li>
<li>Enable webserver logging to capture HTTP request data and facilitate detection and investigation efforts.</li>
<li>Monitor file creation events within the web application root directory for suspicious JSP files. Use the Sigma rule <code>Detect JSP File Creation in Web Application Root</code> as a starting point.</li>
<li>Enforce the <code>module.allow_web_admin</code> restriction consistently across all module upload entry points, including the REST API to prevent bypass.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>zip-slip</category><category>rce</category><category>openmrs</category><category>web-application</category></item><item><title>CI4MS Backup Restore Zip Slip Vulnerability Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-ci4ms-zip-slip/</link><pubDate>Wed, 22 Apr 2026 17:28:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-ci4ms-zip-slip/</guid><description>The CI4MS Backup restore function is vulnerable to Zip Slip, allowing remote code execution by uploading a malicious ZIP archive that writes PHP files to the public web root due to missing validation of entry names during extraction, affecting versions prior to 0.31.5.0.</description><content:encoded><![CDATA[<p>A Zip Slip vulnerability exists in the CI4MS backup restore functionality. Authenticated users with backup creation permissions can exploit this by uploading a specially crafted ZIP archive. The vulnerability lies in the <code>Backup::restore</code> function (modules/Backup/Controllers/Backup.php), where the application extracts the uploaded ZIP without proper validation of the entry names. This allows an attacker to write files to arbitrary locations, including the public web root, leading to remote code execution (RCE). This vulnerability affects CI4MS versions prior to 0.31.5.0. By crafting a ZIP file with malicious paths, attackers can bypass intended directory restrictions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user with <code>create</code> role accesses the vulnerable <code>/backend/backup/restore</code> endpoint.</li>
<li>The attacker crafts a malicious ZIP archive containing a PHP file (e.g., <code>shell.php</code>) with a path traversing outside the intended extraction directory (e.g., <code>../../public/shell.php</code>).</li>
<li>The attacker uploads the malicious ZIP archive via the <code>backup_file</code> parameter in a POST request.</li>
<li>The server moves the uploaded ZIP file to <code>WRITEPATH . 'uploads/'</code> without sanitizing or validating the ZIP entry names.</li>
<li>The <code>ZipArchive::extractTo()</code> function is called on the uploaded ZIP, extracting the malicious file to the specified path <code>../../public/shell.php</code>.</li>
<li>The PHP file is written to the web root, allowing for remote code execution.</li>
<li>The attacker triggers the injected PHP code by sending a request to <code>/shell.php?c=id</code>, executing arbitrary commands on the server.</li>
<li>The attacker gains complete control over the compromised server, including access to sensitive data and the ability to further compromise the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to achieve remote code execution (RCE) on the CI4MS server. This can lead to full compromise of the installation, including the database credentials stored in <code>.env</code> and any other sensitive data handled by the site. Because the affected route is in the <code>csrfExcept</code> list, this vulnerability can be triggered cross-site against a logged-in administrator, potentially leading to drive-by RCE against site operators. The vulnerability affects versions of <code>composer/ci4-cms-erp/ci4ms</code> prior to <code>0.31.5.0</code>.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>composer/ci4-cms-erp/ci4ms</code> to version 0.31.5.0 or later to patch the vulnerability as described in GHSA-xp9f-pvvc-57p4.</li>
<li>Implement server-side validation of uploaded ZIP archive entry names to prevent path traversal vulnerabilities. Specifically, validate the file paths extracted from the ZIP archive before calling <code>extractTo()</code>.</li>
<li>Deploy the Sigma rule <code>Detect CI4MS Zip Slip via Web Request</code> to identify potential exploitation attempts by monitoring HTTP requests to the vulnerable endpoint.</li>
<li>Enable web server logging and monitor for suspicious file creations, especially in web-accessible directories, after ZIP archive uploads, based on the attack chain described above.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>zip-slip</category><category>rce</category><category>code-injection</category><category>vulnerability</category></item><item><title>Coder Code-Marketplace Zip Slip Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-06-code-marketplace-zip-slip/</link><pubDate>Sat, 04 Apr 2026 06:29:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-code-marketplace-zip-slip/</guid><description>A Zip Slip vulnerability in coder/code-marketplace allows authenticated users to upload malicious VSIX files containing path traversal entries, leading to arbitrary file writes outside the extension directory and potentially enabling persistence.</description><content:encoded><![CDATA[<p>A Zip Slip vulnerability (CVE-2026-35454) exists in the Coder code-marketplace application, specifically in versions up to 2.4.1. The vulnerability stems from improper sanitization of zip entry names during VSIX file extraction, which allows an attacker to write files to arbitrary locations on the server. This flaw, discovered by Kandlaguduru Vamsi and detailed in GHSA-8x9r-hvwg-c55h, can be exploited by any authenticated user with upload privileges. Successful exploitation could lead to persistence via cron/init injection, SSH key injection, <code>ld.so.preload</code> hijacking, or binary overwrite. The vulnerability was patched in version 2.4.2. Defenders should upgrade to the latest version of the code-marketplace application to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user with upload privileges logs into the code-marketplace application.</li>
<li>The attacker crafts a malicious VSIX file containing zip entries with path traversal sequences (e.g., &ldquo;../../../etc/cron.d/evil&rdquo;).</li>
<li>The attacker uploads the malicious VSIX file through the application&rsquo;s extension upload functionality.</li>
<li>The <code>ExtractZip</code> function processes the uploaded VSIX file without proper sanitization of zip entry names.</li>
<li>The <code>filepath.Join</code> function constructs the output path using the unsanitized zip entry name and a base directory.</li>
<li>Path traversal sequences like <code>..</code> are resolved by <code>filepath.Clean</code>, but the resulting path is not checked against the intended base directory, allowing it to escape.</li>
<li>The application writes the extracted file to an attacker-controlled location on the server&rsquo;s file system.</li>
<li>The attacker achieves persistence, privilege escalation, or arbitrary code execution by overwriting critical system files or injecting malicious code into system configurations like cron jobs or SSH authorized keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this Zip Slip vulnerability allows attackers to write arbitrary files to the underlying system. An attacker can achieve persistence by injecting malicious cron jobs or modifying system initialization scripts. Privilege escalation is possible via SSH key injection or by overwriting binaries with malicious versions. The impact ranges from system compromise to data exfiltration and denial of service. While the number of victims is unknown, any organization using vulnerable versions of the Coder code-marketplace application is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the coder/code-marketplace application to version 2.4.2 or later to remediate CVE-2026-35454.</li>
<li>Implement file integrity monitoring on critical system directories (e.g., /etc/cron.d, /root/.ssh) using a file_event log source to detect unauthorized file modifications.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious File Creation in Sensitive Directories&rdquo; to detect potential exploitation attempts based on file creation events.</li>
<li>Enable webserver logging and deploy the provided Sigma rule &ldquo;Detect VSIX Uploads with Path Traversal&rdquo; to identify suspicious VSIX uploads containing path traversal sequences based on request parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>zip-slip</category><category>path-traversal</category><category>code-marketplace</category><category>persistence</category></item><item><title>SimpleHelp Path Traversal Vulnerability (CVE-2024-57728)</title><link>https://feed.craftedsignal.io/briefs/2024-06-simplehelp-path-traversal/</link><pubDate>Tue, 25 Jun 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-simplehelp-path-traversal/</guid><description>CVE-2024-57728 is a path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A path traversal vulnerability exists within SimpleHelp, identified as CVE-2024-57728. This flaw enables authenticated administrators to upload arbitrary files to any location on the server&rsquo;s file system. This is achieved through the use of a specially crafted ZIP archive (a technique known as Zip Slip). Successful exploitation allows an attacker to execute arbitrary code within the security context of the SimpleHelp server user. The vulnerability impacts SimpleHelp versions 5.5.7 and earlier. Defenders should apply vendor-provided mitigations or discontinue use of the software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative access to the SimpleHelp console, either through compromised credentials or exploiting a separate authentication bypass.</li>
<li>The attacker crafts a malicious ZIP archive containing a file with a path traversal sequence (e.g., &ldquo;../../ malicious.exe&rdquo;) in its filename.</li>
<li>The attacker uploads the crafted ZIP archive to the SimpleHelp server through a file upload functionality available to administrators.</li>
<li>The SimpleHelp server extracts the contents of the ZIP archive without proper validation of the file paths.</li>
<li>The file with the path traversal sequence is extracted to an arbitrary location on the file system outside of the intended upload directory.</li>
<li>The attacker leverages a method to execute the uploaded malicious executable. This could involve overwriting an existing system utility or service executable.</li>
<li>The malicious executable runs with the privileges of the SimpleHelp server user.</li>
<li>The attacker achieves arbitrary code execution on the host, potentially leading to complete system compromise, data exfiltration, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-57728 allows an attacker to execute arbitrary code on the SimpleHelp server with the privileges of the SimpleHelp service account. This can result in a full compromise of the SimpleHelp server, potentially leading to data theft, service disruption, or further lateral movement within the network. The vulnerability affects SimpleHelp installations, and the impact is high due to the potential for complete system takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the mitigations provided by SimpleHelp to patch the vulnerability. Refer to the vendor advisory for instructions: <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier">https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier</a></li>
<li>Monitor SimpleHelp server file uploads for ZIP archives containing path traversal sequences (e.g., &ldquo;../&rdquo;) in filenames using a file integrity monitoring system (FIM) or endpoint detection and response (EDR) solution. Deploy the &ldquo;Detect SimpleHelp Path Traversal ZIP Upload&rdquo; Sigma rule to identify suspicious ZIP files.</li>
<li>Implement strict access controls and regularly audit administrative access to the SimpleHelp console to prevent unauthorized users from exploiting the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2024-57728</category><category>path-traversal</category><category>zip-slip</category></item><item><title>CI4MS Theme Upload Zip Slip Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-ci4ms-zip-slip/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-ci4ms-zip-slip/</guid><description>A critical vulnerability exists in ci4ms Theme::upload, where improper validation of ZIP archive entry names allows authenticated users with theme creation permissions to write files to arbitrary locations, leading to remote code execution.</description><content:encoded><![CDATA[<p>The ci4ms application is vulnerable to a Zip Slip attack in its theme upload functionality. This vulnerability, present in versions prior to 0.31.5.0, allows an authenticated backend user with theme creation privileges to upload a specially crafted ZIP archive. Due to the lack of proper validation of entry names during extraction, the attacker can write files to arbitrary locations on the filesystem. This is achieved by including malicious path traversal sequences (e.g., <code>../../</code>) in the ZIP archive&rsquo;s entry names. The vulnerability allows an attacker to place a PHP webshell in the public web root, enabling remote code execution on the server. This issue poses a significant risk to organizations using ci4ms, as it allows attackers to fully compromise the installation and access sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the ci4ms backend with an account possessing the theme <code>create</code> role.</li>
<li>The attacker crafts a malicious ZIP archive containing a PHP webshell (e.g., <code>shell.php</code>) and an <code>info.xml</code> file for theme validation. The webshell is placed with a path traversal sequence, such as <code>../../public/shell.php</code>.</li>
<li>The attacker navigates to the theme upload functionality within the ci4ms backend, accessible via the <code>backend/themes/themesUpload</code> route.</li>
<li>The attacker uploads the malicious ZIP archive through the web interface, triggering the <code>Theme::upload</code> function.</li>
<li>The <code>ZipArchive::extractTo()</code> function extracts the contents of the ZIP archive to a temporary directory (<code>WRITEPATH . 'tmp/' . str_replace('_theme.zip', '', $file-&gt;getName()) . '/'</code>) without validating entry names.</li>
<li>Due to the path traversal sequences in the ZIP archive, the PHP webshell is written to the web server&rsquo;s document root (e.g., <code>/var/www/html/public/shell.php</code>).</li>
<li>The attacker accesses the PHP webshell via a web browser or command-line tool like <code>curl</code>, passing commands to be executed on the server (e.g., <code>https://target.example.com/shell.php?c=id</code>).</li>
<li>The webserver executes the attacker-supplied command, granting the attacker remote code execution on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this Zip Slip vulnerability allows an attacker to gain remote code execution on the ci4ms server. This grants the attacker full control over the server, potentially leading to the exfiltration of sensitive data, including database credentials stored in the <code>.env</code> file. The attacker can also modify or delete website content, install malware, or use the compromised server as a launching point for further attacks. This vulnerability affects versions of ci4ms prior to 0.31.5.0, and impacts any installation where an attacker can obtain theme creation privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ci4ms to version 0.31.5.0 or later to patch CVE-2026-41203.</li>
<li>Deploy the Sigma rule <code>Detect CI4MS Webshell Upload via Theme Exploit</code> to detect attempts to upload malicious themes containing webshells.</li>
<li>Implement input validation and sanitization measures to prevent path traversal attacks in file upload functionalities.</li>
<li>Restrict theme creation privileges to only trusted administrators and monitor theme creation activity for suspicious behavior.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>zip-slip</category><category>rce</category><category>codeigniter</category><category>vulnerability</category></item></channel></rss>