<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cline — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/cline/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/cline/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cline Kanban Server Cross-Origin WebSocket Hijacking Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-cline-kanban-websocket-hijacking/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cline-kanban-websocket-hijacking/</guid><description>The `kanban` npm package, used by the `cline` CLI, has a cross-origin WebSocket hijacking vulnerability. Due to the lack of Origin header validation, any website can connect to the kanban server via WebSocket and leak sensitive data, hijack running AI agent terminals leading to remote code execution, or kill running agent tasks, resulting in information disclosure, RCE, and denial of service.</description><content:encoded><![CDATA[<p>The <code>kanban</code> npm package (used by the <code>cline</code> CLI) starts a WebSocket server on <code>127.0.0.1:3484</code> with no Origin header validation, allowing any website a developer visits to silently connect to the kanban server via WebSocket. This vulnerability, present in kanban version 0.1.59 and cline up to version 2.13.0, enables attackers to leak sensitive data in real-time, including workspace filesystem paths, task titles/descriptions, and git branch info. Furthermore, attackers can hijack running AI agent terminals by injecting arbitrary prompts, leading to remote code execution, and kill running agent tasks by terminating active sessions via the control WebSocket. This vulnerability poses a significant risk to developers using the <code>cline</code> CLI, as it allows for complete compromise of their local development environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker hosts a malicious website.</li>
<li>Victim visits the attacker-controlled website while running a vulnerable version of Cline with Kanban.</li>
<li>The malicious website establishes a WebSocket connection to <code>ws://127.0.0.1:3484/api/runtime/ws</code> on the victim&rsquo;s machine.</li>
<li>The server sends a snapshot of the developer&rsquo;s workspace, leaking sensitive information, including file paths, task details, and Git information.</li>
<li>The attacker monitors the runtime WebSocket for <code>task_sessions_updated</code> messages to detect running AI agent sessions.</li>
<li>Upon detecting a running session, the attacker connects to <code>ws://127.0.0.1:3484/api/terminal/io</code> and injects a malicious prompt followed by a carriage return.</li>
<li>The injected prompt is executed by the AI agent, leading to remote code execution.</li>
<li>Alternatively, the attacker could connect to <code>ws://127.0.0.1:3484/api/terminal/control</code> and send a &ldquo;stop&rdquo; message to terminate the task.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows for information disclosure by leaking sensitive development environment data, including workspace paths, task content, and Git branches, streamed in real-time from any website. It also enables remote code execution through terminal hijacking, where commands are injected into the AI agent when a task is active. Finally, it permits denial of service by killing any running agent task via the control WebSocket. Attack requirements: The victim must have Cline Kanban running and visit an attacker-controlled webpage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect connections to the exposed WebSocket endpoints (ws_connection_kanban_api).</li>
<li>Block access to the malicious PoC URL <code>http://cline.sagilayani.com:1337/?key=clinevuln2026</code> at the network perimeter based on the IOC list.</li>
<li>Apply the recommended fixes by the vendor, including validating the Origin header on WebSocket upgrade requests and requiring a session token.</li>
<li>Patch CVE-2026-44211 by updating <code>cline</code> to a version greater than 2.13.0.</li>
<li>Monitor network connections to <code>127.0.0.1:3484</code> to identify potential exploitation attempts using network_connection logs based on the IOC list.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>websocket</category><category>cross-origin</category><category>rce</category><category>infoleak</category><category>dos</category></item></channel></rss>