CVE-2026-0805
📋 TL;DR
An input neutralization vulnerability in Crafty Controller's Backup Configuration component allows authenticated attackers to perform path traversal attacks. This enables file tampering and remote code execution on affected systems. Only authenticated users can exploit this vulnerability.
💻 Affected Systems
- Crafty Controller
📦 What is this software?
Crafty Controller by Craftycontrol
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining root/admin privileges, data exfiltration, and persistent backdoor installation.
Likely Case
Unauthorized file access/modification leading to service disruption, configuration changes, or lateral movement within the network.
If Mitigated
Limited impact due to network segmentation, minimal privileges, and proper input validation preventing successful exploitation.
🎯 Exploit Status
Exploitation requires authenticated access but uses simple path traversal techniques. The vulnerability is well-documented in the public issue tracker.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check the GitLab issue for specific fixed version
Vendor Advisory: https://gitlab.com/crafty-controller/crafty-4/-/issues/650
Restart Required: Yes
Instructions:
1. Check the GitLab issue for the specific patched version. 2. Update Crafty Controller to the latest version. 3. Restart the Crafty Controller service. 4. Verify the fix by testing path traversal attempts.
🔧 Temporary Workarounds
Disable Backup Configuration
allTemporarily disable the vulnerable Backup Configuration component
# Edit Crafty Controller configuration to disable backup features
# Consult Crafty Controller documentation for specific configuration changes
Network Access Restriction
linuxRestrict access to Crafty Controller administration interface
# Use firewall rules to limit access to trusted IPs only
sudo ufw allow from TRUSTED_IP to any port CRAFTY_PORT
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Crafty Controller from critical systems
- Apply principle of least privilege to Crafty Controller service accounts and restrict file system access
🔍 How to Verify
Check if Vulnerable:
Check Crafty Controller version against the patched version mentioned in the GitLab issue. Test if path traversal is possible in Backup Configuration.
Check Version:
# Check Crafty Controller version via web interface or configuration files
Verify Fix Applied:
Attempt path traversal attacks against the Backup Configuration component after patching. Verify they are properly blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in Crafty Controller logs
- Multiple failed path traversal attempts
- Unauthorized configuration changes
Network Indicators:
- Unusual outbound connections from Crafty Controller server
- Unexpected file transfers from the controller
SIEM Query:
source="crafty-controller.log" AND ("path traversal" OR "../" OR "..\" OR unauthorized file access)