CVE-2026-0805

8.2 HIGH

📋 TL;DR

An input neutralization vulnerability in Crafty Controller's Backup Configuration component allows authenticated attackers to perform path traversal attacks. This enables file tampering and remote code execution on affected systems. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Crafty Controller
Versions: Crafty-4 versions prior to the fix
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Backup Configuration component. All default installations with this feature enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/admin privileges, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Unauthorized file access/modification leading to service disruption, configuration changes, or lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, minimal privileges, and proper input validation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple path traversal techniques. The vulnerability is well-documented in the public issue tracker.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check the GitLab issue for specific fixed version

Vendor Advisory: https://gitlab.com/crafty-controller/crafty-4/-/issues/650

Restart Required: Yes

Instructions:

1. Check the GitLab issue for the specific patched version. 2. Update Crafty Controller to the latest version. 3. Restart the Crafty Controller service. 4. Verify the fix by testing path traversal attempts.

🔧 Temporary Workarounds

Disable Backup Configuration

all

Temporarily disable the vulnerable Backup Configuration component

# Edit Crafty Controller configuration to disable backup features
# Consult Crafty Controller documentation for specific configuration changes

Network Access Restriction

linux

Restrict access to Crafty Controller administration interface

# Use firewall rules to limit access to trusted IPs only
sudo ufw allow from TRUSTED_IP to any port CRAFTY_PORT

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Crafty Controller from critical systems
  • Apply principle of least privilege to Crafty Controller service accounts and restrict file system access

🔍 How to Verify

Check if Vulnerable:

Check Crafty Controller version against the patched version mentioned in the GitLab issue. Test if path traversal is possible in Backup Configuration.

Check Version:

# Check Crafty Controller version via web interface or configuration files

Verify Fix Applied:

Attempt path traversal attacks against the Backup Configuration component after patching. Verify they are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Crafty Controller logs
  • Multiple failed path traversal attempts
  • Unauthorized configuration changes

Network Indicators:

  • Unusual outbound connections from Crafty Controller server
  • Unexpected file transfers from the controller

SIEM Query:

source="crafty-controller.log" AND ("path traversal" OR "../" OR "..\" OR unauthorized file access)

🔗 References

📤 Share & Export