CVE-2024-33860

6.5 MEDIUM

📋 TL;DR

This Local File Inclusion vulnerability in Logpoint versions before 7.4.0 allows attackers to read arbitrary files on the system through the File System Collector. Attackers can view sensitive file contents in incoming logs. This affects all Logpoint deployments using vulnerable versions.

💻 Affected Systems

Products:
  • Logpoint
Versions: All versions before 7.4.0
Operating Systems: Linux-based systems where Logpoint is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the File System Collector component specifically. Requires access to the Logpoint interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive files like /etc/shadow, SSH keys, or configuration files containing credentials, potentially leading to privilege escalation or lateral movement.

🟠

Likely Case

Unauthorized access to sensitive system files, configuration files, or application data, resulting in information disclosure and potential credential theft.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation, though sensitive information could still be exposed.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

LFI vulnerabilities are commonly exploited. Requires authenticated access to the Logpoint interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.0

Vendor Advisory: https://servicedesk.logpoint.com/hc/en-us/articles/18533986803741-Local-File-Inclusion-in-File-System-Collector

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Logpoint 7.4.0 from official sources. 3. Follow Logpoint upgrade documentation for your deployment type. 4. Verify upgrade completion and functionality.

🔧 Temporary Workarounds

Restrict File System Collector Access

all

Limit which users can access or configure the File System Collector component.

# Configure role-based access control in Logpoint to restrict File System Collector permissions

File Permission Hardening

linux

Set strict file permissions on sensitive system files to limit what can be read even if LFI succeeds.

chmod 600 /etc/shadow
chmod 600 ~/.ssh/*
chmod 600 sensitive_config_files

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Logpoint systems from sensitive data stores.
  • Deploy file integrity monitoring to detect unauthorized file access attempts.

🔍 How to Verify

Check if Vulnerable:

Check Logpoint version via web interface or command line. If version is below 7.4.0, system is vulnerable.

Check Version:

Check Logpoint web interface dashboard or run: grep version /opt/logpoint/version.txt

Verify Fix Applied:

Confirm version is 7.4.0 or higher and test File System Collector with path traversal attempts that should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in File System Collector logs
  • Multiple failed LFI attempts in application logs
  • Access to sensitive file paths in collector logs

Network Indicators:

  • Unusual outbound connections from Logpoint server after LFI exploitation

SIEM Query:

source="logpoint" AND (path="*../*" OR path="*/etc/*" OR path="*/root/*")

🔗 References

📤 Share & Export