<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Duartium — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/duartium/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 01:17:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/duartium/feed.xml" rel="self" type="application/rss+xml"/><item><title>Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)</title><link>https://feed.craftedsignal.io/briefs/2026-04-duartium-path-traversal/</link><pubDate>Tue, 28 Apr 2026 01:17:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-duartium-path-traversal/</guid><description>A path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in duartium papers-mcp-server, specifically version 9ceb3812a6458ba7922ca24a7406f8807bc55598. The vulnerability resides within the <code>search_papers</code> function located in the <code>src/main.py</code> file. By manipulating the <code>topic</code> argument, a remote attacker can exploit this flaw to traverse the file system and potentially read sensitive files. This vulnerability, identified as CVE-2026-7205, is remotely exploitable and has a publicly available exploit, increasing the risk of widespread exploitation. The project maintainers were notified, but there has been no response or patch released, making immediate defensive measures critical for organizations using this software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>search_papers</code> function.</li>
<li>Within the HTTP request, the attacker injects a path traversal payload into the <code>topic</code> argument, such as &ldquo;../../etc/passwd&rdquo;.</li>
<li>The server-side application, without proper sanitization, processes the malicious <code>topic</code> argument.</li>
<li>The application attempts to read the file specified by the attacker&rsquo;s path traversal payload (e.g., /etc/passwd).</li>
<li>The server responds with the contents of the requested file, effectively leaking sensitive information to the attacker.</li>
<li>The attacker analyzes the leaked file for sensitive data, such as usernames, passwords, or configuration details.</li>
<li>The attacker uses the obtained information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows attackers to read arbitrary files on the affected server. This could lead to the disclosure of sensitive configuration files, user credentials, or source code, potentially leading to further compromise, lateral movement within the network, and data breaches. The lack of a patch and the availability of a public exploit increases the likelihood of widespread exploitation and potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided in this brief to detect exploitation attempts against the <code>search_papers</code> endpoint, focusing on path traversal payloads in the <code>topic</code> parameter.</li>
<li>Implement input validation and sanitization on the <code>topic</code> parameter within the <code>search_papers</code> function to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences like &ldquo;../&rdquo; and &ldquo;./&rdquo; in the URI query to detect potential exploitation attempts.</li>
<li>Apply rate limiting to the <code>search_papers</code> endpoint to mitigate potential brute-force path traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item></channel></rss>