Logsign Unified SecOps Platform Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.
The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-25027.
                
            References
                    | Link | Resource | 
|---|---|
| https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes | Release Notes | 
| https://www.zerodayinitiative.com/advisories/ZDI-24-1102/ | Third Party Advisory VDB Entry | 
Configurations
                    History
                    23 Aug 2024, 16:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes - Release Notes | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-24-1102/ - Third Party Advisory, VDB Entry | |
| Summary | 
 | |
| CPE | cpe:2.3:a:logsign:unified_secops_platform:6.4.20:*:*:*:*:*:*:* | |
| First Time | Logsign unified Secops Platform Logsign | 
21 Aug 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-08-21 16:15
Updated : 2024-08-23 16:36
NVD link : CVE-2024-7602
Mitre link : CVE-2024-7602
CVE.ORG link : CVE-2024-7602
JSON object : View
Products Affected
                logsign
- unified_secops_platform
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
