Description
The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version
a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b (git)
Credits
Mobasi Security Team
References
github.com/...ommit/a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b (Patch Commit)
mobasi.ai/sentinel (Mobasi Sentinel Vulnerability Index)
www.vulncheck.com/...s/sleuth-kit-tsk-recover-path-traversal (VulnCheck Advisory: Sleuth Kit tsk_recover Path Traversal)