Search criteria

2 vulnerabilities found for NetExec by Pennyw0rth

CVE-2026-27884 (GCVE-0-2026-27884)

Vulnerability from nvd – Published: 2026-02-26 00:39 – Updated: 2026-02-26 00:39
VLAI?
Title
NetExec vulnerable to arbitrary file write via path traversal in spider_plus module
Summary
NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An attacker can craft a filename in an SMB share that includes these characters, which when spider_plus crawls and downloads, can write or overwrite arbitrary files. The issue is patched in v1.5.1. As a workaround, do not run spider_plus with DOWNLOAD=true against targets.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
Pennyw0rth NetExec Affected: < 1.5.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "NetExec",
          "vendor": "Pennyw0rth",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.5.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An attacker can craft a filename in an SMB share that includes these characters, which when spider_plus crawls and downloads, can write or overwrite arbitrary files. The issue is patched in v1.5.1. As a workaround, do not run spider_plus with DOWNLOAD=true against targets."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-26T00:39:15.832Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/Pennyw0rth/NetExec/security/advisories/GHSA-fccr-6qm2-7h27",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Pennyw0rth/NetExec/security/advisories/GHSA-fccr-6qm2-7h27"
        },
        {
          "name": "https://github.com/Pennyw0rth/NetExec/issues/1120",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Pennyw0rth/NetExec/issues/1120"
        },
        {
          "name": "https://github.com/Pennyw0rth/NetExec/pull/1121",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Pennyw0rth/NetExec/pull/1121"
        },
        {
          "name": "https://github.com/Pennyw0rth/NetExec/commit/7d027f2774d0520b322d60f9c99b9ab3edb4035e",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Pennyw0rth/NetExec/commit/7d027f2774d0520b322d60f9c99b9ab3edb4035e"
        }
      ],
      "source": {
        "advisory": "GHSA-fccr-6qm2-7h27",
        "discovery": "UNKNOWN"
      },
      "title": "NetExec vulnerable to arbitrary file write via path traversal in spider_plus module"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-27884",
    "datePublished": "2026-02-26T00:39:15.832Z",
    "dateReserved": "2026-02-24T15:19:29.716Z",
    "dateUpdated": "2026-02-26T00:39:15.832Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-27884 (GCVE-0-2026-27884)

Vulnerability from cvelistv5 – Published: 2026-02-26 00:39 – Updated: 2026-02-26 00:39
VLAI?
Title
NetExec vulnerable to arbitrary file write via path traversal in spider_plus module
Summary
NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An attacker can craft a filename in an SMB share that includes these characters, which when spider_plus crawls and downloads, can write or overwrite arbitrary files. The issue is patched in v1.5.1. As a workaround, do not run spider_plus with DOWNLOAD=true against targets.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
Pennyw0rth NetExec Affected: < 1.5.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "product": "NetExec",
          "vendor": "Pennyw0rth",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 1.5.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An attacker can craft a filename in an SMB share that includes these characters, which when spider_plus crawls and downloads, can write or overwrite arbitrary files. The issue is patched in v1.5.1. As a workaround, do not run spider_plus with DOWNLOAD=true against targets."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-26T00:39:15.832Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/Pennyw0rth/NetExec/security/advisories/GHSA-fccr-6qm2-7h27",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/Pennyw0rth/NetExec/security/advisories/GHSA-fccr-6qm2-7h27"
        },
        {
          "name": "https://github.com/Pennyw0rth/NetExec/issues/1120",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Pennyw0rth/NetExec/issues/1120"
        },
        {
          "name": "https://github.com/Pennyw0rth/NetExec/pull/1121",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Pennyw0rth/NetExec/pull/1121"
        },
        {
          "name": "https://github.com/Pennyw0rth/NetExec/commit/7d027f2774d0520b322d60f9c99b9ab3edb4035e",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/Pennyw0rth/NetExec/commit/7d027f2774d0520b322d60f9c99b9ab3edb4035e"
        }
      ],
      "source": {
        "advisory": "GHSA-fccr-6qm2-7h27",
        "discovery": "UNKNOWN"
      },
      "title": "NetExec vulnerable to arbitrary file write via path traversal in spider_plus module"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-27884",
    "datePublished": "2026-02-26T00:39:15.832Z",
    "dateReserved": "2026-02-24T15:19:29.716Z",
    "dateUpdated": "2026-02-26T00:39:15.832Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}