top of page
perceptive_background_267k.jpg

Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4, a path traversal vulnerability in Ferret's IO::FS::WRITE standard library func…

Published:

5 april 2026 om 22:00:00

Alert date:

6 april 2026 om 18:04:04

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

A path traversal vulnerability in Ferret's IO::FS::WRITE standard library function allows malicious websites to write arbitrary files to the filesystem. When scraping websites that return filenames containing ../ sequences, attackers can control both destination paths and file content. This can lead to remote code execution through cron jobs, SSH authorized_keys, shell profiles, or web shells. The vulnerability affects versions prior to 2.0.0-alpha.4 and has been fixed in that release.

Technical details

Mitigation steps:

Affected products:

Ferret

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page