Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alfredredbird
Alfredredbird tookie-osint |
|
| Vendors & Products |
Alfredredbird
Alfredredbird tookie-osint |
Mon, 11 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tookie is a advanced OSINT information gathering tool. Prior to 4.1fix, modules/modules.py's write_txt, write_csv, write_json, and (commented-but-shipping) scan_file helpers open their output as open(f"{user}.<ext>"), where user comes unsanitized from the -u CLI flag or any line of a -U usernames file. A username that contains path-separator sequences (.., /, \, or an absolute path) causes tookie-osint to write the scan output to an arbitrary path the invoking user has write permission for. This vulnerability is fixed in 4.1fix. | |
| Title | Tookie: Arbitrary file write via path traversal in -u username / -U userfile output filename | |
| Weaknesses | CWE-22 CWE-73 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T18:36:50.830Z
Reserved: 2026-04-30T18:49:06.710Z
Link: CVE-2026-42866
Updated: 2026-05-11T18:36:45.229Z
Status : Deferred
Published: 2026-05-11T19:16:24.617
Modified: 2026-05-13T18:31:17.630
Link: CVE-2026-42866
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:22:31Z