NIXPKGS-2026-1023
GitHub issue
published on
Permalink
CVE-2026-40024
7.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse ignored
- @LeSuisse accepted
- @LeSuisse published on GitHub
Sleuth Kit tsk_recover Path Traversal
The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
References
-
Patch Commit patch
Ignored references (2)
-
Mobasi Sentinel Vulnerability Index vendor-advisory
-
VulnCheck Advisory: Sleuth Kit tsk_recover Path Traversal third-party-advisory
Affected products
sleuthkit
- ==a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b
- =<4.14.0
Package maintainers
-
@gfrascadorio Galois <gfrascadorio@tutanota.com>
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>