CVE-2024-7603
📋 TL;DR
This vulnerability allows authenticated remote attackers to delete arbitrary directories on Logsign Unified SecOps Platform installations. Attackers can leverage directory traversal in the HTTP API service to delete system directories with root privileges. Organizations running vulnerable Logsign versions are affected.
💻 Affected Systems
- Logsign Unified SecOps Platform
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through deletion of critical system directories, leading to service disruption, data loss, and potential privilege escalation.
Likely Case
Targeted deletion of application directories causing service disruption, data loss, and potential foothold for further attacks.
If Mitigated
Limited impact if proper network segmentation and authentication controls prevent unauthorized access to the HTTP API.
🎯 Exploit Status
Exploitation requires authentication but uses simple directory traversal techniques. The vulnerability is documented in ZDI-24-1105 advisory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.23
Vendor Advisory: https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes
Restart Required: Yes
Instructions:
1. Backup current configuration and data. 2. Download Logsign Unified SecOps Platform version 6.4.23 from official sources. 3. Follow vendor upgrade instructions for your deployment type. 4. Restart services after upgrade. 5. Verify the fix by testing directory traversal attempts.
🔧 Temporary Workarounds
Restrict HTTP API Access
linuxLimit network access to the HTTP API service to trusted IP addresses only
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
Implement Strong Authentication Controls
allEnforce multi-factor authentication and strong password policies for all API users
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Logsign platform from critical systems
- Enable detailed logging and monitoring of all HTTP API directory operations
🔍 How to Verify
Check if Vulnerable:
Check Logsign version via web interface or command line. Versions below 6.4.23 are vulnerable.
Check Version:
Check web interface admin panel or run: cat /opt/logsign/version.txt
Verify Fix Applied:
After upgrading to 6.4.23, attempt directory traversal attacks against the HTTP API to confirm they are blocked.
📡 Detection & Monitoring
Log Indicators:
- HTTP API requests containing '../' patterns
- Failed directory deletion attempts
- Unusual authentication patterns to API
Network Indicators:
- HTTP POST requests to API endpoints with path traversal payloads
- Multiple failed authentication attempts followed by successful login
SIEM Query:
source="logsign" AND (http_uri="*../*" OR http_body="*../*")