{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/vendors/duartium/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":7.3,"id":"CVE-2026-7205"}],"_cs_exploited":false,"_cs_products":["papers-mcp-server"],"_cs_severities":["high"],"_cs_tags":["path-traversal","vulnerability","web-application"],"_cs_type":"advisory","_cs_vendors":["duartium"],"content_html":"\u003cp\u003eA path traversal vulnerability has been identified in duartium papers-mcp-server, specifically version 9ceb3812a6458ba7922ca24a7406f8807bc55598. The vulnerability resides within the \u003ccode\u003esearch_papers\u003c/code\u003e function located in the \u003ccode\u003esrc/main.py\u003c/code\u003e file. By manipulating the \u003ccode\u003etopic\u003c/code\u003e argument, a remote attacker can exploit this flaw to traverse the file system and potentially read sensitive files. This vulnerability, identified as CVE-2026-7205, is remotely exploitable and has a publicly available exploit, increasing the risk of widespread exploitation. The project maintainers were notified, but there has been no response or patch released, making immediate defensive measures critical for organizations using this software.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker identifies a vulnerable instance of duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious HTTP request targeting the \u003ccode\u003esearch_papers\u003c/code\u003e function.\u003c/li\u003e\n\u003cli\u003eWithin the HTTP request, the attacker injects a path traversal payload into the \u003ccode\u003etopic\u003c/code\u003e argument, such as \u0026ldquo;../../etc/passwd\u0026rdquo;.\u003c/li\u003e\n\u003cli\u003eThe server-side application, without proper sanitization, processes the malicious \u003ccode\u003etopic\u003c/code\u003e argument.\u003c/li\u003e\n\u003cli\u003eThe application attempts to read the file specified by the attacker\u0026rsquo;s path traversal payload (e.g., /etc/passwd).\u003c/li\u003e\n\u003cli\u003eThe server responds with the contents of the requested file, effectively leaking sensitive information to the attacker.\u003c/li\u003e\n\u003cli\u003eThe attacker analyzes the leaked file for sensitive data, such as usernames, passwords, or configuration details.\u003c/li\u003e\n\u003cli\u003eThe attacker uses the obtained information to further compromise the system or network.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this path traversal vulnerability allows attackers to read arbitrary files on the affected server. This could lead to the disclosure of sensitive configuration files, user credentials, or source code, potentially leading to further compromise, lateral movement within the network, and data breaches. The lack of a patch and the availability of a public exploit increases the likelihood of widespread exploitation and potential damage.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eDeploy the Sigma rule provided in this brief to detect exploitation attempts against the \u003ccode\u003esearch_papers\u003c/code\u003e endpoint, focusing on path traversal payloads in the \u003ccode\u003etopic\u003c/code\u003e parameter.\u003c/li\u003e\n\u003cli\u003eImplement input validation and sanitization on the \u003ccode\u003etopic\u003c/code\u003e parameter within the \u003ccode\u003esearch_papers\u003c/code\u003e function to prevent path traversal attacks.\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for suspicious requests containing path traversal sequences like \u0026ldquo;../\u0026rdquo; and \u0026ldquo;./\u0026rdquo; in the URI query to detect potential exploitation attempts.\u003c/li\u003e\n\u003cli\u003eApply rate limiting to the \u003ccode\u003esearch_papers\u003c/code\u003e endpoint to mitigate potential brute-force path traversal attempts.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-04-28T01:17:16Z","date_published":"2026-04-28T01:17:16Z","id":"/briefs/2026-04-duartium-path-traversal/","summary":"A path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.","title":"Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)","url":"https://feed.craftedsignal.io/briefs/2026-04-duartium-path-traversal/"}],"language":"en","title":"CraftedSignal Threat Feed — Duartium","version":"https://jsonfeed.org/version/1.1"}