CVE-2026-31817

8.5 HIGH

📋 TL;DR

CVE-2026-31817 is a path traversal vulnerability in OliveTin's log file creation mechanism. When the saveLogs feature is enabled, attackers can inject directory traversal sequences into the UniqueTrackingId field to write files to arbitrary filesystem locations. This affects all OliveTin deployments with saveLogs enabled prior to version 3000.11.2.

💻 Affected Systems

Products:
  • OliveTin
Versions: All versions prior to 3000.11.2
Operating Systems: All platforms running OliveTin
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when saveLogs feature is enabled. Default configuration may not have this enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary file write leading to remote code execution, configuration modification, or sensitive data overwrite.

🟠

Likely Case

Unauthorized file creation/modification in web-accessible directories, potentially leading to web shell deployment or data manipulation.

🟢

If Mitigated

Limited impact if saveLogs is disabled or proper input validation is implemented.

🌐 Internet-Facing: HIGH - Web interface accessible from internet makes exploitation trivial.
🏢 Internal Only: MEDIUM - Requires network access but exploitation is straightforward once access is gained.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the StartAction API endpoint. The vulnerability is simple to exploit once authenticated or if API is exposed without proper authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3000.11.2

Vendor Advisory: https://github.com/OliveTin/OliveTin/security/advisories/GHSA-364q-w7vh-vhpc

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Stop OliveTin service. 3. Update to version 3000.11.2 or later. 4. Restart OliveTin service. 5. Verify logs are being written correctly.

🔧 Temporary Workarounds

Disable saveLogs feature

all

Disable the vulnerable log persistence feature entirely

Edit OliveTin config file and set 'saveLogs: false'

Restrict API access

all

Implement network-level restrictions to limit access to the StartAction API endpoint

Configure firewall rules to restrict access to OliveTin web interface

🧯 If You Can't Patch

  • Disable saveLogs feature in configuration immediately
  • Implement strict network segmentation and access controls for OliveTin instances

🔍 How to Verify

Check if Vulnerable:

Check if OliveTin version is below 3000.11.2 AND saveLogs is enabled in configuration

Check Version:

olivetin --version or check package manager version

Verify Fix Applied:

Confirm version is 3000.11.2 or higher and test that directory traversal attempts in UniqueTrackingId are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file paths in log entries
  • Failed file write attempts with traversal sequences
  • Multiple log files created with suspicious names

Network Indicators:

  • HTTP requests to StartAction endpoint with unusual UniqueTrackingId values
  • Patterns of ../ sequences in API requests

SIEM Query:

source="olivetin" AND (UniqueTrackingId="*../*" OR path="*../*")

🔗 References

📤 Share & Export