First published: Fri Nov 22 2024(Updated: )
Logsign Unified SecOps Platform delete_gsuite_key_file Input Validation Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files within sensitive directories on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the delete_gsuite_key_file endpoint. The issue results from the lack of proper validation of a user-supplied filename prior to using it in file operations. An attacker can leverage this vulnerability to delete critical files on the system. Was ZDI-CAN-25265.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform | ||
Logsign Unified SecOps Platform | <6.4.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9257 is classified as a critical vulnerability due to its potential for arbitrary file deletion in sensitive directories.
To fix CVE-2024-9257, upgrade to version 6.4.26 or later of the Logsign Unified SecOps Platform.
CVE-2024-9257 affects installations of Logsign Unified SecOps Platform versions prior to 6.4.26.
The potential impacts of CVE-2024-9257 include unauthorized deletion of critical files, leading to operational disruptions and data loss.
CVE-2024-9257 can be exploited by remote attackers without authentication, making it particularly dangerous.