Logsign Unified SecOps Platform Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.
The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of root. Was ZDI-CAN-25025.
References
Link | Resource |
---|---|
https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes | Release Notes |
https://www.zerodayinitiative.com/advisories/ZDI-24-1103/ | Third Party Advisory VDB Entry |
Configurations
History
23 Aug 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
First Time |
Logsign unified Secops Platform
Logsign |
|
References | () https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes - Release Notes | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-1103/ - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:logsign:unified_secops_platform:6.4.20:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
Summary |
|
21 Aug 2024, 17:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-21 16:15
Updated : 2024-08-23 16:35
NVD link : CVE-2024-7600
Mitre link : CVE-2024-7600
CVE.ORG link : CVE-2024-7600
JSON object : View
Products Affected
logsign
- unified_secops_platform
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')