CVE-2024-5720

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to execute arbitrary system commands with root privileges on Logsign Unified SecOps Platform installations. Attackers can bypass existing authentication mechanisms to exploit the command injection flaw in the HTTP API. Organizations running vulnerable versions of Logsign Unified SecOps Platform are affected.

💻 Affected Systems

Products:
  • Logsign Unified SecOps Platform
Versions: Versions prior to 6.4.8
Operating Systems: Linux-based systems running Logsign
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with HTTP API enabled are vulnerable. Authentication is required but can be bypassed according to the advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, allowing attackers to install persistent backdoors, exfiltrate sensitive security data, pivot to other network systems, and disrupt security monitoring operations.

🟠

Likely Case

Attackers gain root shell access to the Logsign platform, enabling them to manipulate security logs, disable monitoring, and potentially access credentials stored on the system.

🟢

If Mitigated

With proper network segmentation and strict access controls, impact is limited to the Logsign system itself, though root compromise still represents significant risk to security monitoring integrity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

ZDI has published an advisory (ZDI-24-613) with technical details. The authentication bypass combined with command injection makes exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.8

Vendor Advisory: https://support.logsign.net/hc/en-us/articles/19316621924754-03-06-2024-Version-6-4-8-Release-Notes

Restart Required: Yes

Instructions:

1. Backup current configuration and logs. 2. Download Logsign Unified SecOps Platform version 6.4.8 from official sources. 3. Follow vendor upgrade instructions for your deployment type. 4. Restart the Logsign services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Logsign HTTP API to trusted IP addresses only

iptables -A INPUT -p tcp --dport [LOG_SIGN_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [LOG_SIGN_PORT] -j DROP

API Authentication Hardening

all

Implement additional authentication layers or disable vulnerable API endpoints if not needed

🧯 If You Can't Patch

  • Isolate the Logsign system in a dedicated security VLAN with strict firewall rules limiting inbound connections
  • Implement network-based intrusion detection rules to monitor for command injection patterns in HTTP requests to the Logsign API

🔍 How to Verify

Check if Vulnerable:

Check Logsign version via web interface or command line. Versions below 6.4.8 are vulnerable.

Check Version:

cat /opt/logsign/version.txt || grep version /opt/logsign/config/*

Verify Fix Applied:

Verify version is 6.4.8 or higher in Logsign admin interface or via system commands

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • HTTP requests containing shell metacharacters (;, |, &, $, `) to Logsign API endpoints
  • Authentication bypass attempts followed by unusual API calls

Network Indicators:

  • HTTP POST/GET requests to Logsign API containing suspicious parameters with shell characters
  • Unusual outbound connections from Logsign server following API requests

SIEM Query:

source="logsign" AND (http_uri="*api*" AND (http_query="*;*" OR http_query="*|*" OR http_query="*`*" OR http_query="*$(*"))

🔗 References

📤 Share & Export