CVE-2026-40024 PUBLISHED

Sleuth Kit tsk_recover Path Traversal

Assigner: VulnCheck
Reserved: 08.04.2026 Published: 08.04.2026 Updated: 08.04.2026

The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.4

Product Status

Vendor sleuthkit
Product sleuthkit
Versions Default: unaffected
  • affected from 0 to 4.14.0 (incl.)
  • Version a3f96b3bc36a8bb1a00c297f77110d4a6e7dd31b is unaffected

Credits

  • Mobasi Security Team finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE