CVE-2022-48684

8.4 HIGH

📋 TL;DR

This CVE describes a template injection vulnerability in Logpoint's search template feature that uses Jinja templating. Any authenticated user with search template creation privileges can exploit this to execute arbitrary code as the loginspect user, potentially leading to full system compromise. This affects all Logpoint deployments before version 7.1.1.

💻 Affected Systems

Products:
  • Logpoint
Versions: All versions before 7.1.1
Operating Systems: All supported Logpoint OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Default Logpoint installations with search template functionality enabled are vulnerable. The vulnerability requires authenticated access with search template creation privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining loginspect user privileges, allowing them to execute arbitrary commands, access sensitive data, pivot to other systems, and maintain persistence.

🟠

Likely Case

Authenticated attackers with search template privileges achieve remote code execution, potentially stealing sensitive log data, modifying configurations, or deploying malware.

🟢

If Mitigated

With proper access controls limiting search template creation to trusted administrators only, the attack surface is significantly reduced to insider threats.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has search template creation privileges. Template injection vulnerabilities in Jinja are well-documented attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.1

Vendor Advisory: https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template

Restart Required: Yes

Instructions:

1. Backup your Logpoint configuration and data. 2. Upgrade to Logpoint version 7.1.1 or later. 3. Restart the Logpoint services. 4. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict Search Template Creation

all

Limit search template creation privileges to only essential administrators until patching can be completed.

Disable Search Template Feature

all

Temporarily disable the search template functionality if not critically needed for operations.

🧯 If You Can't Patch

  • Implement strict access controls to limit search template creation to only trusted administrators
  • Monitor for suspicious search template creation activities and review audit logs regularly

🔍 How to Verify

Check if Vulnerable:

Check Logpoint version via web interface or command line. If version is below 7.1.1, the system is vulnerable.

Check Version:

Check Logpoint web interface admin panel or consult Logpoint documentation for version check command specific to your deployment.

Verify Fix Applied:

After upgrading, verify the version is 7.1.1 or higher and test that search template functionality works without allowing code execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual search template creation events
  • Loginspect user executing unexpected commands
  • Suspicious Jinja template patterns in search templates

Network Indicators:

  • Unusual outbound connections from Logpoint server
  • Unexpected command and control traffic

SIEM Query:

source="logpoint" AND (event_type="template_creation" OR user="loginspect") AND suspicious_patterns

🔗 References

📤 Share & Export