First published: Fri Nov 22 2024(Updated: )
Logsign Unified SecOps Platform Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the HTTP API. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24167.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5719 has a high severity rating due to its potential for remote code execution.
To mitigate CVE-2024-5719, ensure that your Logsign Unified SecOps Platform is updated to the latest version released after the vulnerability was identified.
CVE-2024-5719 can allow remote attackers to execute arbitrary commands, leading to potential full system compromise.
Yes, exploitation of CVE-2024-5719 requires authentication to the Logsign Unified SecOps Platform.
CVE-2024-5719 affects installations of the Logsign Unified SecOps Platform that are not patched against this vulnerability.