<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Eiceblue — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/eiceblue/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/eiceblue/feed.xml" rel="self" type="application/rss+xml"/><item><title>Eiceblue Spire-PDF-MCP-Server Path Traversal Vulnerability (CVE-2026-7315)</title><link>https://feed.craftedsignal.io/briefs/2026-04-spire-pdf-path-traversal/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spire-pdf-path-traversal/</guid><description>A path traversal vulnerability exists in eiceblue spire-pdf-mcp-server version 0.1.1, allowing remote attackers to access arbitrary files via manipulation of the filepath argument in the get_pdf_path function.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7315, affects eiceblue spire-pdf-mcp-server version 0.1.1. The vulnerability resides in the <code>get_pdf_path</code> function within the <code>src/spire_pdf_mcp/server.py</code> file. By manipulating the <code>filepath</code> argument, a remote attacker can bypass directory traversal restrictions and potentially access sensitive files on the server. Public exploits are available, increasing the risk of exploitation. The vendor has been notified but has not yet provided a patch or response. This vulnerability poses a significant risk to systems running the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of eiceblue spire-pdf-mcp-server 0.1.1 exposed to the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>get_pdf_path</code> function, embedding a path traversal sequence (e.g., <code>../</code>) within the <code>filepath</code> parameter.</li>
<li>The server receives the request and processes the <code>filepath</code> argument without proper sanitization or validation.</li>
<li>The <code>get_pdf_path</code> function constructs a file path using the attacker-controlled input, allowing the traversal of directories outside the intended PDF file storage location.</li>
<li>The server attempts to access a file outside the intended directory, based on the manipulated path.</li>
<li>If successful, the server reads the contents of the arbitrary file.</li>
<li>The server returns the contents of the file to the attacker.</li>
<li>The attacker gains unauthorized access to sensitive information, potentially including configuration files, credentials, or other confidential data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7315 allows a remote attacker to read arbitrary files on the server. This can lead to the disclosure of sensitive information, such as configuration files, credentials, or internal application code. The impact could include complete compromise of the affected system and potential lateral movement within the network. Given the availability of public exploits, the risk of widespread exploitation is elevated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Spire-PDF Path Traversal Attempt</code> to identify malicious requests containing path traversal sequences.</li>
<li>Monitor web server logs for HTTP requests targeting the <code>get_pdf_path</code> function with suspicious <code>filepath</code> parameters (e.g., containing &ldquo;../&rdquo;).</li>
<li>Implement strict input validation and sanitization measures for the <code>filepath</code> argument in the <code>get_pdf_path</code> function to prevent path traversal attacks.</li>
<li>Apply any available patches or updates from the vendor as soon as they are released to address CVE-2026-7315.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve</category></item><item><title>eiceblue spire-doc-mcp-server Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-spire-doc-mcp-server-path-traversal/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spire-doc-mcp-server-path-traversal/</guid><description>A path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.</description><content:encoded><![CDATA[<p>A critical path traversal vulnerability has been identified in eiceblue spire-doc-mcp-server version 1.0.0. The vulnerability resides within the <code>get_doc_path</code> function of the <code>src/spire_doc_mcp/api/base.py</code> file. By manipulating the <code>document_name</code> argument, an attacker can bypass intended directory restrictions and access files outside the designated document path. This attack can be initiated remotely without authentication, posing a significant risk. Public exploits are available, increasing the likelihood of exploitation. The vendor was notified through an issue report, but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the spire-doc-mcp-server.</li>
<li>The request targets an endpoint that utilizes the vulnerable <code>get_doc_path</code> function.</li>
<li>The attacker manipulates the <code>document_name</code> parameter within the request.</li>
<li>The <code>document_name</code> parameter contains a path traversal sequence (e.g., &ldquo;../&rdquo;) designed to escape the intended directory.</li>
<li>The <code>get_doc_path</code> function fails to properly sanitize or validate the <code>document_name</code> input.</li>
<li>The application constructs a file path based on the malicious input.</li>
<li>The application attempts to read the file at the attacker-controlled path.</li>
<li>The attacker successfully retrieves the contents of an arbitrary file on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows an attacker to read sensitive files on the server. This could include configuration files containing credentials, source code, or other confidential data. The CVSS v3.1 score of 7.3 reflects the high severity of this issue. The lack of vendor response and availability of public exploits significantly increases the risk to organizations using vulnerable versions of spire-doc-mcp-server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Spire-doc-mcp-server Path Traversal Attempt</code> to your SIEM to detect exploitation attempts by monitoring web server logs for path traversal sequences.</li>
<li>Apply input validation and sanitization to the <code>document_name</code> argument in the <code>get_doc_path</code> function within <code>src/spire_doc_mcp/api/base.py</code> to prevent path traversal.</li>
<li>Monitor web server logs for HTTP requests containing path traversal sequences (e.g., &ldquo;..%2F&rdquo;, &ldquo;../&rdquo;) targeting endpoints related to document retrieval.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7314</category></item></channel></rss>