Home

Description

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

PUBLISHED Reserved 2026-04-08 | Published 2026-04-08 | Updated 2026-04-09 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

HIGH: 7.1CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version
affected

a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b (git)
unaffected

Credits

Mobasi Security Team finder

References

github.com/...ommit/a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b (Patch Commit) patch

mobasi.ai/sentinel (Mobasi Sentinel Vulnerability Index) vendor-advisory

www.vulncheck.com/...s/sleuth-kit-tsk-recover-path-traversal (VulnCheck Advisory: Sleuth Kit tsk_recover Path Traversal) third-party-advisory

cve.org (CVE-2026-40024)

nvd.nist.gov (CVE-2026-40024)

Download JSON