CVE-2026-7784
Path Traversal in RTGS2017 NagaAgent
Publication date: 2026-05-05
Last updated on: 2026-05-05
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rtgs2017 | nagaagent | to 5.1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not explicitly mention the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability exists in RTGS2017 NagaAgent up to version 5.1.0, specifically in the file apiserver/routes/extensions.py within the Skills Endpoint component. It involves improper handling of the argument 'Name' which allows for path traversal attacks. This means an attacker can manipulate the input to access files or directories outside the intended scope.
The attack can be launched remotely, and the exploit has already been publicly disclosed.
How can this vulnerability impact me? :
The vulnerability allows an attacker to perform path traversal, potentially accessing sensitive files or data on the affected system that should not be accessible. This can lead to unauthorized information disclosure, data manipulation, or further exploitation of the system.
Since the attack can be performed remotely without authentication, it increases the risk of compromise.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring and testing the API endpoints related to skill management, specifically the POST /skills/import and DELETE /skills/{name} endpoints.
Detection involves checking if the system improperly accepts skill names containing path traversal sequences such as "..\" or "%5C" that allow directory traversal outside the intended directories.
You can use commands like curl to test these endpoints by sending crafted requests with suspicious skill names to see if the system improperly processes them.
- Example command to test import endpoint: curl -X POST http://<target>/skills/import -d '{"name": "..\evil"}' -H 'Content-Type: application/json'
- Example command to test delete endpoint: curl -X DELETE http://<target>/skills/..\evil
Additionally, monitoring filesystem changes or unexpected directory creations/deletions outside the skill storage directories can help detect exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable API endpoints by limiting their exposure to trusted networks or users.
Enforce authentication and authorization on the POST /skills/import and DELETE /skills/{name} endpoints to prevent unauthorized use.
Run the NagaAgent process with the least privileges necessary to limit the impact of any exploitation.
Implement input validation to reject skill names containing path traversal sequences such as "..\" or "%5C".
Apply path containment checks to ensure skill names cannot escape the intended directories.
Consider temporarily disabling or firewalling the vulnerable endpoints until a patch or fix is applied.