{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/vendors/tubitak-bilgem-software-technologies-research-institute/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":9.6,"id":"CVE-2026-5166"}],"_cs_exploited":false,"_cs_products":["Pardus Software Center"],"_cs_severities":["critical"],"_cs_tags":["cve-2026-5166","path-traversal","web-application"],"_cs_type":"advisory","_cs_vendors":["TUBITAK BILGEM Software Technologies Research Institute"],"content_html":"\u003cp\u003eCVE-2026-5166 is a critical path traversal vulnerability discovered in TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center, affecting versions prior to 1.0.3. This vulnerability allows an attacker to bypass directory restrictions and potentially access sensitive files or execute arbitrary code on the underlying system. Path traversal vulnerabilities arise when an application does not properly sanitize user-supplied input used to construct file paths. This can lead to unauthorized access and modification of data, potentially leading to a full system compromise. The vulnerability was published on 2026-04-29, but due to its severity, detection engineers should prioritize creating detections for it.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker identifies an endpoint in Pardus Software Center that accepts file paths as input.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious request containing a path traversal payload, such as \u0026ldquo;../../../etc/passwd\u0026rdquo;.\u003c/li\u003e\n\u003cli\u003eThe application fails to properly sanitize the input, allowing the path traversal sequence to be processed.\u003c/li\u003e\n\u003cli\u003eThe application constructs a file path using the unsanitized input, effectively escaping the intended directory.\u003c/li\u003e\n\u003cli\u003eThe application attempts to access the file specified by the attacker-controlled path.\u003c/li\u003e\n\u003cli\u003eIf successful, the attacker can read sensitive files such as configuration files, user data, or system binaries.\u003c/li\u003e\n\u003cli\u003eThe attacker may leverage the ability to read sensitive files to gain further information about the system, such as user credentials or system configuration.\u003c/li\u003e\n\u003cli\u003eThe attacker can then exploit this information to escalate privileges or compromise other parts of the system.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of CVE-2026-5166 can lead to unauthorized access to sensitive data, including configuration files, user data, and system binaries. This could allow an attacker to steal credentials, escalate privileges, or compromise the entire system. Given the CVSS v3.1 base score of 9.6, this vulnerability poses a critical risk to systems running affected versions of Pardus Software Center. The exact number of affected systems is currently unknown, but organizations using this software are urged to apply mitigations immediately.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade Pardus Software Center to version 1.0.3 or later to patch CVE-2026-5166.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003ePardus Software Center Path Traversal Attempt\u003c/code\u003e to detect exploitation attempts in web server logs.\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for suspicious requests containing path traversal sequences like \u0026ldquo;../\u0026rdquo; or \u0026ldquo;..\u0026quot; to detect potential exploitation attempts.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2024-01-03T12:00:00Z","date_published":"2024-01-03T12:00:00Z","id":"/briefs/2024-01-pardus-path-traversal/","summary":"CVE-2026-5166 is a path traversal vulnerability affecting TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center before version 1.0.3, allowing attackers to bypass directory restrictions.","title":"Pardus Software Center Path Traversal Vulnerability (CVE-2026-5166)","url":"https://feed.craftedsignal.io/briefs/2024-01-pardus-path-traversal/"},{"_cs_actors":[],"_cs_cves":[{"cvss":8.8,"id":"CVE-2026-6849"}],"_cs_exploited":false,"_cs_products":["Pardus OS My Computer"],"_cs_severities":["critical"],"_cs_tags":["cve-2026-6849","os command injection","pardus os"],"_cs_type":"advisory","_cs_vendors":["TUBITAK BILGEM Software Technologies Research Institute"],"content_html":"\u003cp\u003eCVE-2026-6849 is a critical vulnerability affecting Pardus OS My Computer, a software developed by TUBITAK BILGEM Software Technologies Research Institute. This OS Command Injection vulnerability exists in versions \u0026lt;=0.7.5 and before 0.8.0. The vulnerability stems from the improper neutralization of special elements used in OS commands, potentially allowing an attacker to inject and execute arbitrary commands on the underlying operating system. Successful exploitation could lead to complete system compromise, data exfiltration, or denial-of-service conditions. Defenders should prioritize patching affected systems and implementing detection measures to identify and prevent exploitation attempts.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAttacker identifies an input field within Pardus OS My Computer that is vulnerable to OS command injection.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious input string containing special elements designed to be interpreted as OS commands.\u003c/li\u003e\n\u003cli\u003eThe vulnerable software fails to properly sanitize or neutralize these special elements.\u003c/li\u003e\n\u003cli\u003eThe software passes the unsanitized input string to an OS command interpreter (e.g., \u003ccode\u003esystem()\u003c/code\u003e, \u003ccode\u003eexec()\u003c/code\u003e).\u003c/li\u003e\n\u003cli\u003eThe OS command interpreter executes the attacker\u0026rsquo;s injected commands with the privileges of the running application.\u003c/li\u003e\n\u003cli\u003eThe attacker gains arbitrary code execution on the server.\u003c/li\u003e\n\u003cli\u003eThe attacker uses the gained access to install malware, exfiltrate sensitive data, or perform other malicious actions.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of CVE-2026-6849 can lead to a complete compromise of the affected Pardus OS My Computer system. This could allow attackers to gain unauthorized access to sensitive data, install malware, disrupt services, or pivot to other systems on the network. Given the critical nature of OS command injection vulnerabilities, organizations using affected versions of Pardus OS My Computer should prioritize patching and mitigation efforts.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade Pardus OS My Computer to version 0.8.0 or later to patch CVE-2026-6849.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003eDetect Suspicious Pardus OS My Computer Processes\u003c/code\u003e to your SIEM to detect potential exploitation attempts via process creation.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2024-01-02T12:00:00Z","date_published":"2024-01-02T12:00:00Z","id":"/briefs/2024-01-pardus-os-command-injection/","summary":"CVE-2026-6849 is an OS Command Injection vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus OS My Computer versions \u003c=0.7.5 before 0.8.0, allowing an attacker to execute arbitrary OS commands due to improper neutralization of special elements.","title":"Pardus OS My Computer OS Command Injection Vulnerability (CVE-2026-6849)","url":"https://feed.craftedsignal.io/briefs/2024-01-pardus-os-command-injection/"}],"language":"en","title":"CraftedSignal Threat Feed — TUBITAK BILGEM Software Technologies Research Institute","version":"https://jsonfeed.org/version/1.1"}