CVE-2022-48684
📋 TL;DR
This CVE describes a template injection vulnerability in Logpoint's search template feature that uses Jinja templating. Any authenticated user with search template creation privileges can exploit this to execute arbitrary code as the loginspect user, potentially leading to full system compromise. This affects all Logpoint deployments before version 7.1.1.
💻 Affected Systems
- Logpoint
📦 What is this software?
Siem by Logpoint
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining loginspect user privileges, allowing them to execute arbitrary commands, access sensitive data, pivot to other systems, and maintain persistence.
Likely Case
Authenticated attackers with search template privileges achieve remote code execution, potentially stealing sensitive log data, modifying configurations, or deploying malware.
If Mitigated
With proper access controls limiting search template creation to trusted administrators only, the attack surface is significantly reduced to insider threats.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once an attacker has search template creation privileges. Template injection vulnerabilities in Jinja are well-documented attack vectors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.1.1
Vendor Advisory: https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template
Restart Required: Yes
Instructions:
1. Backup your Logpoint configuration and data. 2. Upgrade to Logpoint version 7.1.1 or later. 3. Restart the Logpoint services. 4. Verify the upgrade was successful.
🔧 Temporary Workarounds
Restrict Search Template Creation
allLimit search template creation privileges to only essential administrators until patching can be completed.
Disable Search Template Feature
allTemporarily disable the search template functionality if not critically needed for operations.
🧯 If You Can't Patch
- Implement strict access controls to limit search template creation to only trusted administrators
- Monitor for suspicious search template creation activities and review audit logs regularly
🔍 How to Verify
Check if Vulnerable:
Check Logpoint version via web interface or command line. If version is below 7.1.1, the system is vulnerable.
Check Version:
Check Logpoint web interface admin panel or consult Logpoint documentation for version check command specific to your deployment.
Verify Fix Applied:
After upgrading, verify the version is 7.1.1 or higher and test that search template functionality works without allowing code execution.
📡 Detection & Monitoring
Log Indicators:
- Unusual search template creation events
- Loginspect user executing unexpected commands
- Suspicious Jinja template patterns in search templates
Network Indicators:
- Unusual outbound connections from Logpoint server
- Unexpected command and control traffic
SIEM Query:
source="logpoint" AND (event_type="template_creation" OR user="loginspect") AND suspicious_patterns