Description
The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
INFO
Published Date :
2026-04-08T21:35:20.662Z
Last Modified :
2026-04-09T18:13:37.338Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-40024 vulnerability.
| Vendors | Products |
|---|---|
| Sleuthkit |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40024.