CVE-2024-33857
📋 TL;DR
A Server-Side Request Forgery (SSRF) vulnerability in Logpoint versions before 7.4.0 allows attackers with low-level access to make unauthorized requests from the server. This occurs due to insufficient input validation on URLs in threat intelligence features. Organizations running vulnerable Logpoint versions are affected.
💻 Affected Systems
- Logpoint
📦 What is this software?
Siem by Logpoint
⚠️ Risk & Real-World Impact
Worst Case
Attacker could access internal services, exfiltrate sensitive data, or pivot to other systems in the network.
Likely Case
Unauthorized access to internal HTTP services, potential data leakage from internal endpoints.
If Mitigated
Limited impact if network segmentation restricts internal service access from Logpoint server.
🎯 Exploit Status
Requires low-level access to Logpoint system. Exploitation involves crafting malicious URLs in threat intelligence.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.4.0
Vendor Advisory: https://servicedesk.logpoint.com/hc/en-us/articles/18533639896093-Server-Side-Request-Forgery-SSRF-on-Threat-Intelligence
Restart Required: Yes
Instructions:
1. Backup Logpoint configuration. 2. Upgrade to Logpoint 7.4.0 or later. 3. Restart Logpoint services. 4. Verify threat intelligence functionality.
🔧 Temporary Workarounds
Disable threat intelligence URL processing
allTemporarily disable URL-based threat intelligence features until patching
# Requires Logpoint admin console access
# Navigate to Settings > Threat Intelligence > Disable URL processing
Network segmentation
linuxRestrict Logpoint server network access to only required internal services
# Configure firewall rules to limit outbound connections from Logpoint server
# Example: iptables -A OUTPUT -p tcp --dport 80 -j DROP
# Example: iptables -A OUTPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to limit Logpoint server outbound connections
- Monitor all outbound HTTP/HTTPS requests from Logpoint server for suspicious patterns
🔍 How to Verify
Check if Vulnerable:
Check Logpoint version via admin console or command: cat /etc/logpoint/version
Check Version:
cat /etc/logpoint/version
Verify Fix Applied:
Confirm version is 7.4.0 or later and test threat intelligence URL functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from Logpoint server
- Multiple failed URL validations in threat intelligence logs
Network Indicators:
- Unexpected HTTP/HTTPS traffic from Logpoint server to internal services
- Requests to unusual ports or internal IP ranges
SIEM Query:
source="logpoint" AND (http_request OR url_validation) AND (status="failed" OR dest_ip=~"10.*|192.168.*|172.16.*")
🔗 References
- https://servicedesk.logpoint.com/hc/en-us/articles/18533639896093-Server-Side-Request-Forgery-SSRF-on-Threat-Intelligence
- https://servicedesk.logpoint.com/hc/en-us/categories/200832975-Knowledge-Center
- https://servicedesk.logpoint.com/hc/en-us/articles/18533639896093-Server-Side-Request-Forgery-SSRF-on-Threat-Intelligence
- https://servicedesk.logpoint.com/hc/en-us/categories/200832975-Knowledge-Center