Vulnerabilities (CVE)

Filtered by vendor Logrhythm Subscribe
Filtered by product Platform Manager
Total 3 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-25096 1 Logrhythm 1 Platform Manager 2024-11-21 6.5 MEDIUM 8.8 HIGH
LogRhythm Platform Manager (PM) 7.4.9 has Incorrect Access Control. Users within LogRhythm can be delegated different roles and privileges, intended to limit what data and services they can interact with. However, no access control is enforced for WebSocket-based communication to the PM application server, which will forward requests to any configured back-end server, regardless of whether the user's access rights should permit this. As a result, even the most low-privileged user can interact with any back-end component that has a LogRhythm agent installed.
CVE-2020-25095 1 Logrhythm 1 Platform Manager 2024-11-21 6.8 MEDIUM 8.8 HIGH
LogRhythm Platform Manager (PM) 7.4.9 allows CSRF. The Web interface is vulnerable to Cross-site WebSocket Hijacking (CSWH). If a logged-in PM user visits a malicious site in the same browser session, that site can perform a CSRF attack to create a WebSocket from the victim client to the vulnerable PM server. Once the socket is created, the malicious site can interact with the vulnerable web server in the context of the logged-in user. This can include WebSocket payloads that result in command execution.
CVE-2020-25094 1 Logrhythm 1 Platform Manager 2024-11-21 10.0 HIGH 9.8 CRITICAL
LogRhythm Platform Manager 7.4.9 allows Command Injection. To exploit this, an attacker can inject arbitrary program names and arguments into a WebSocket. These are forwarded to any remote server with a LogRhythm Smart Response agent installed. By default, the commands are run with LocalSystem privileges.