First published: Fri Nov 22 2024(Updated: )
Logsign Unified SecOps Platform Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the HTTP API. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24168.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5720 is a critical vulnerability that allows remote code execution on affected systems.
To mitigate CVE-2024-5720, update your Logsign Unified SecOps Platform to the latest version provided by the vendor.
Organizations using the Logsign Unified SecOps Platform are vulnerable to CVE-2024-5720.
CVE-2024-5720 is a command injection vulnerability that leads to remote code execution.
Yes, authentication is required for an attacker to exploit CVE-2024-5720.