"Sensitive Data Exposure via Directory Traversal in Logsign SecOps"
Logsign Unified SecOps Platform has a Directory Traversal Information Disclosure vulnerability. This lets remote attackers access sensitive info on systems running Logsign Unified SecOps Platform. The attacker must be authenticated to exploit this issue.
The problem is found in the get_response_json_result endpoint. This happens because the path given by the user is not checked properly before it is used in file operations. An attacker can use this flaw to reveal information as the root user. The vulnerability was identified as ZDI-CAN-24680.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
logsign unified secops platform 6.4.11 |