First published: Thu Aug 08 2024(Updated: )
This vulnerability allows remote attackers to delete arbitrary directories on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete directories in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-25028 is high due to the risk of remote attackers deleting arbitrary directories.
To fix ZDI-CAN-25028, ensure that your Logsign Unified SecOps Platform is updated to the latest security patch provided by the vendor.
ZDI-CAN-25028 affects specific versions of Logsign Unified SecOps Platform that are not patched against this vulnerability.
Yes, authentication is required to exploit ZDI-CAN-25028.
ZDI-CAN-25028 allows authenticated attackers to delete arbitrary directories which could lead to data loss.