An issue was discovered in Logpoint before 7.1.1. Template injection was seen in the search template. The search template uses jinja templating for generating dynamic data. This could be abused to achieve code execution. Any user with access to create a search template can leverage this to execute code as the loginspect user.
References
Configurations
No configuration.
History
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template - |
25 Oct 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE |
03 Jul 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 CWE-1336 |
|
Summary |
|
27 Apr 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-27 23:15
Updated : 2024-11-21 07:33
NVD link : CVE-2022-48684
Mitre link : CVE-2022-48684
CVE.ORG link : CVE-2022-48684
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')