CVE-2024-7602

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers to perform directory traversal attacks on Logsign Unified SecOps Platform installations. By exploiting improper path validation in the HTTP API service, attackers can access sensitive files outside intended directories, potentially exposing configuration files, logs, or other sensitive data. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Logsign Unified SecOps Platform
Versions: Versions prior to 6.4.23
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The HTTP API service runs on TCP port 443 by default and requires authentication to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with valid credentials could access sensitive system files, configuration data, or logs containing credentials, potentially leading to full system compromise or lateral movement within the network.

🟠

Likely Case

Authenticated attackers accessing sensitive configuration files, logs, or other data that could facilitate further attacks or expose sensitive information.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to authorized users who already have some level of access to the system.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but the directory traversal technique is well-understood and simple to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.23

Vendor Advisory: https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download version 6.4.23 from Logsign support portal. 3. Follow Logsign upgrade documentation for your deployment type. 4. Restart services after upgrade completion.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to the HTTP API service (port 443) to only trusted networks and users.

# Configure firewall rules to restrict access
# Example: iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
# iptables -A INPUT -p tcp --dport 443 -j DROP

Authentication Hardening

all

Implement strong authentication policies including MFA, complex passwords, and account lockouts.

# Configure strong authentication in Logsign settings
# Enable MFA if available
# Review and remove unnecessary user accounts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Logsign platform from sensitive systems
  • Enhance monitoring and alerting for unusual file access patterns in the HTTP API logs

🔍 How to Verify

Check if Vulnerable:

Check the Logsign platform version via the web interface or by examining the installed package version. Versions prior to 6.4.23 are vulnerable.

Check Version:

# Check version via web interface: Admin → System Information
# Or check package: rpm -qa | grep logsign  # For RPM-based systems

Verify Fix Applied:

Verify the platform version shows 6.4.23 or later in the administration interface or via package management commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in HTTP API access logs
  • Multiple failed authentication attempts followed by successful directory traversal attempts
  • Access to files outside normal application directories

Network Indicators:

  • HTTP requests with directory traversal sequences (../, ..\) to the API endpoint
  • Unusual file download patterns from the API service

SIEM Query:

source="logsign_http_api" AND (uri="*../*" OR uri="*..\\*")

🔗 References

📤 Share & Export