Lucene search

K
vulnrichmentZdiVULNRICHMENT:CVE-2024-7564
HistoryAug 06, 2024 - 3:47 p.m.

CVE-2024-7564 Logsign Unified SecOps Platform Directory Traversal Information Disclosure Vulnerability

2024-08-0615:47:49
CWE-22
zdi
github.com
2
logsign unified secops platform
directory traversal
information disclosure
vulnerability
authentication
file operations
zdi-can-24680

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6

Confidence

High

EPSS

0.002

Percentile

61.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Logsign Unified SecOps Platform Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.

The specific flaw exists within the get_response_json_result endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-24680.

CNA Affected

[
  {
    "vendor": "Logsign",
    "product": "Unified SecOps Platform",
    "versions": [
      {
        "status": "affected",
        "version": "6.4.11"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6

Confidence

High

EPSS

0.002

Percentile

61.6%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-7564