OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Olivetin
Olivetin olivetin |
|
| Vendors & Products |
Olivetin
Olivetin olivetin |
Wed, 11 Mar 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OliveTin has unsafe parsing of UniqueTrackingId can be used to write files | OliveTin's unsafe parsing of UniqueTrackingId can be used to write files |
Tue, 10 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2. | |
| Title | OliveTin has unsafe parsing of UniqueTrackingId can be used to write files | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-10T21:08:53.873Z
Updated: 2026-03-11T15:19:29.025Z
Reserved: 2026-03-09T17:41:56.075Z
Link: CVE-2026-31817
Updated: 2026-03-11T15:10:53.190Z
Status : Awaiting Analysis
Published: 2026-03-10T22:16:19.167
Modified: 2026-03-11T13:52:47.683
Link: CVE-2026-31817
No data.
ReportizFlow