Description
OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2.
Published: 2026-03-10
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Write
Action: Patch
AI Analysis

Impact

OliveTin allows the execution of predefined shell commands through a web interface. When the saveLogs feature is enabled, log files are created on disk using a filename that incorporates the user-supplied UniqueTrackingId field from the StartAction API request. This value is used directly in a file path without any validation or sanitization, which permits directory traversal sequences such as ../../../. An attacker can exploit this flaw to write files to arbitrary locations on the host filesystem, potentially installing malicious binaries or modifying critical system files. The weakness aligns with Path Traversal (CWE-22).

Affected Systems

Any OliveTin installation running a version earlier than 3000.11.2 with the saveLogs option enabled is vulnerable. The issue is independent of the operating system because the path resolution occurs within the OliveTin process itself.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.5, indicating high severity. Its exploitation probability is measured at less than 1% and it is not listed in the Known Exploited Vulnerabilities catalog, suggesting it has not been widely used by adversaries yet. However, the potential impact of creating or overw arbitrary files represents a serious confidentiality, integrity, and availability risk. The attack vector is remote, requiring only network access to the OliveTin service and the ability to send a crafted API request. Immediate remediation is advised to prevent possible compromise.

Generated by OpenCVE AI on April 16, 2026 at 09:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OliveTin to version 3000.11.2 or newer, which removes the path validation flaw.
  • If a patch is not immediately available, disable the saveLogs feature to stop log files from being created with user-controlled names.
  • Restrict network access to the OliveTin API so that only trusted hosts or authenticated users can send commands.

Generated by OpenCVE AI on April 16, 2026 at 09:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-364q-w7vh-vhpc OliveTin's unsafe parsing of UniqueTrackingId can be used to write files
History

Thu, 12 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:olivetin:olivetin:*:*:*:*:*:*:*:*

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Olivetin
Olivetin olivetin
Vendors & Products Olivetin
Olivetin olivetin

Wed, 11 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Title OliveTin has unsafe parsing of UniqueTrackingId can be used to write files OliveTin's unsafe parsing of UniqueTrackingId can be used to write files

Tue, 10 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2.
Title OliveTin has unsafe parsing of UniqueTrackingId can be used to write files
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L'}


Subscriptions

Olivetin Olivetin
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T15:19:29.025Z

Reserved: 2026-03-09T17:41:56.075Z

Link: CVE-2026-31817

cve-icon Vulnrichment

Updated: 2026-03-11T15:10:53.190Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T22:16:19.167

Modified: 2026-03-12T18:12:18.937

Link: CVE-2026-31817

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:30:06Z

Weaknesses