First published: Wed Jun 12 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the HTTP API. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-24165 is critical due to the potential for unauthorized remote code execution.
To fix ZDI-CAN-24165, ensure that you have applied the latest security patch provided by Logsign for the Unified SecOps Platform.
Organizations using vulnerable versions of the Logsign Unified SecOps Platform are affected by ZDI-CAN-24165.
ZDI-CAN-24165 requires authentication, but the existing mechanism can be bypassed, making exploitation possible.
The consequences of ZDI-CAN-24165 can include unauthorized access and execution of arbitrary code, potentially compromising sensitive data.