First published: Thu Sep 26 2024(Updated: )
This vulnerability allows remote attackers to delete arbitrary files within sensitive directories on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the delete_gsuite_key_file endpoint. The issue results from the lack of proper validation of a user-supplied filename prior to using it in file operations. An attacker can leverage this vulnerability to delete critical files on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-25265 is classified as important as it allows authenticated remote attackers to delete arbitrary files.
To fix ZDI-CAN-25265, ensure that your Logsign Unified SecOps Platform is updated to the latest version as recommended by the vendor.
ZDI-CAN-25265 allows remote authenticated attackers to manipulate file systems and potentially compromise sensitive data.
Yes, ZDI-CAN-25265 requires authentication to exploit the vulnerability.
ZDI-CAN-25265 affects the Logsign Unified SecOps Platform.