{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/vendors/@evomap/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":["@evomap/evolver"],"_cs_severities":["high"],"_cs_tags":["path-traversal","arbitrary-file-write","privilege-escalation","evolver"],"_cs_type":"advisory","_cs_vendors":["@evomap"],"content_html":"\u003cp\u003eThe \u003ccode\u003e@evomap/evolver\u003c/code\u003e package contains a path traversal vulnerability in its \u003ccode\u003efetch\u003c/code\u003e command, specifically affecting versions prior to 1.69.3. This flaw arises from the insufficient validation of user-supplied paths provided via the \u003ccode\u003e--out\u003c/code\u003e flag. By manipulating this flag, attackers can bypass intended directory restrictions and write files to arbitrary locations on the filesystem. This can lead to critical system file modification, potentially leading to privilege escalation and persistent backdoor installation. The vulnerability exists in the \u003ccode\u003eindex.js\u003c/code\u003e file, where the application processes the \u003ccode\u003e--out\u003c/code\u003e flag without proper sanitization before writing files to the specified directory. This is particularly concerning in automated environments like CI/CD pipelines where user input might be indirectly injected into the \u003ccode\u003efetch\u003c/code\u003e command.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker gains control over the input to the \u003ccode\u003efetch\u003c/code\u003e command, including the \u003ccode\u003e--out\u003c/code\u003e flag.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious \u003ccode\u003e--out\u003c/code\u003e parameter containing path traversal sequences (e.g., \u003ccode\u003e../../../\u003c/code\u003e).\u003c/li\u003e\n\u003cli\u003eThe \u003ccode\u003efetch\u003c/code\u003e command in \u003ccode\u003eindex.js\u003c/code\u003e processes the \u003ccode\u003e--out\u003c/code\u003e flag and extracts the user-provided path without validation.\u003c/li\u003e\n\u003cli\u003eThe application attempts to create the directory specified by the manipulated \u003ccode\u003e--out\u003c/code\u003e flag using \u003ccode\u003efs.mkdirSync\u003c/code\u003e with the \u003ccode\u003erecursive\u003c/code\u003e option.\u003c/li\u003e\n\u003cli\u003eThe application writes files (e.g., downloaded skill files) to the directory specified in the \u003ccode\u003e--out\u003c/code\u003e parameter using \u003ccode\u003efs.writeFileSync\u003c/code\u003e, effectively writing to an arbitrary location.\u003c/li\u003e\n\u003cli\u003eIf the attacker has sufficient privileges, they can overwrite critical system files or create new files in sensitive directories like \u003ccode\u003e/etc/cron.d\u003c/code\u003e.\u003c/li\u003e\n\u003cli\u003eThe attacker leverages the modified files to achieve persistence (e.g., by creating a cron job).\u003c/li\u003e\n\u003cli\u003eThe attacker executes malicious code, gaining unauthorized access or escalating privileges.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability allows an attacker to write files to arbitrary locations on the filesystem. This can lead to several critical consequences, including overwriting system configuration files, installing persistent backdoors via cron jobs, modifying SSH authorized_keys for unauthorized access, and potentially achieving privilege escalation if the affected process runs with elevated privileges. The impact is particularly severe in automated environments where this tool is used to deploy code, as it opens the door for supply chain attacks. This issue affects users of \u003ccode\u003e@evomap/evolver\u003c/code\u003e prior to version 1.69.3.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade the \u003ccode\u003e@evomap/evolver\u003c/code\u003e package to version 1.69.3 or later to remediate the path traversal vulnerability.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003eDetect Evolver Path Traversal Attempt\u003c/code\u003e to identify exploitation attempts based on command-line arguments.\u003c/li\u003e\n\u003cli\u003eMonitor process creation events for command-line arguments containing path traversal sequences like \u003ccode\u003e../\u003c/code\u003e when executing \u003ccode\u003enode\u003c/code\u003e or \u003ccode\u003enodejs\u003c/code\u003e related to evolver.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2024-08-10T12:00:00Z","date_published":"2024-08-10T12:00:00Z","id":"/briefs/2024-08-evolver-path-traversal/","summary":"A path traversal vulnerability exists in the `fetch` command of `@evomap/evolver` due to insufficient validation of the `--out` flag, allowing attackers to write files to arbitrary locations on the filesystem, potentially leading to overwriting critical system files and privilege escalation.","title":"Evolver Path Traversal Vulnerability in `fetch` Command","url":"https://feed.craftedsignal.io/briefs/2024-08-evolver-path-traversal/"}],"language":"en","title":"CraftedSignal Threat Feed — @Evomap","version":"https://jsonfeed.org/version/1.1"}