Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33858: n/a

0
Medium
VulnerabilityCVE-2024-33858cvecve-2024-33858
Published: Tue May 07 2024 (05/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-33858 is a path injection vulnerability in Logpoint versions prior to 7. 4. 0. It occurs when adding a CSV enrichment source, where the source_name parameter can be manipulated to specify an absolute path. This allows an attacker to write a CSV file to arbitrary locations within the /tmp directory. The vulnerability has a CVSS score of 5. 3 (medium severity) and does not impact confidentiality or integrity but affects availability by potentially overwriting files. No authentication or user interaction is required to exploit this issue. There are no known exploits in the wild currently. Organizations using vulnerable Logpoint versions should update to 7.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:36:39 UTC

Technical Analysis

CVE-2024-33858 is a path injection vulnerability identified in Logpoint versions before 7.4.0. The flaw arises during the process of adding a CSV enrichment source, specifically through the source_name parameter. This parameter is intended to specify the name of the CSV file to be used for enrichment purposes. However, due to insufficient input validation, an attacker can supply an absolute path instead of a simple filename. This manipulation causes the system to write the CSV file to an arbitrary location within the /tmp directory. The vulnerability is classified under CWE-91 (Path Injection), which typically allows attackers to influence file system operations by injecting malicious path data. Exploiting this vulnerability does not require authentication or user interaction, and the attack vector is network-based (AV:N). The impact is limited to availability, as the attacker could overwrite or create files in /tmp, potentially disrupting system processes or causing denial of service. Confidentiality and integrity are not directly affected. The CVSS 3.1 base score is 5.3, reflecting medium severity. No patches or exploits are currently publicly available, but the issue is documented and should be addressed promptly. This vulnerability highlights the importance of strict input validation and sanitization when handling file paths in software components.

Potential Impact

The primary impact of CVE-2024-33858 is on system availability. By allowing an attacker to write files to arbitrary locations within the /tmp directory, the vulnerability could be exploited to overwrite critical temporary files or place malicious files that disrupt Logpoint's normal operation or other system processes relying on /tmp. This could lead to denial of service conditions or unexpected behavior in the affected system. Since the vulnerability does not affect confidentiality or integrity, sensitive data exposure or unauthorized data modification is unlikely. However, the ability to write files without authentication or user interaction increases the risk surface, especially in environments where Logpoint is exposed to untrusted networks. Organizations relying on Logpoint for security information and event management (SIEM) could face operational disruptions, impacting their security monitoring capabilities. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers could develop exploits once the vulnerability details are public. Overall, the impact is moderate but significant enough to warrant timely remediation.

Mitigation Recommendations

To mitigate CVE-2024-33858, organizations should take the following specific actions: 1) Upgrade Logpoint to version 7.4.0 or later once the patch is officially released, as this will address the vulnerability directly. 2) Until a patch is available, implement strict input validation and sanitization on the source_name parameter to ensure it only accepts valid filenames without path traversal characters or absolute paths. 3) Restrict write permissions on the /tmp directory and monitor file creation/modification activities within /tmp to detect suspicious behavior. 4) Employ application-level controls such as web application firewalls (WAFs) to detect and block malicious payloads attempting path injection. 5) Conduct regular security audits and code reviews focusing on file handling routines to prevent similar vulnerabilities. 6) Isolate Logpoint instances in network segments with limited exposure to untrusted networks to reduce the attack surface. 7) Monitor vendor advisories and threat intelligence feeds for updates or emerging exploits related to this vulnerability. These targeted measures go beyond generic advice by focusing on the specific injection vector and operational environment of Logpoint.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c49b7ef31ef0b561f58

Added to database: 2/25/2026, 9:40:25 PM

Last enriched: 2/26/2026, 4:36:39 AM

Last updated: 2/26/2026, 9:34:18 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats