CVE-2024-33858: n/a
An issue was discovered in Logpoint before 7.4.0. A path injection vulnerability is seen while adding a CSV enrichment source. The source_name parameter could be changed to an absolute path; this will write the CSV file to that path inside the /tmp directory.
AI Analysis
Technical Summary
CVE-2024-33858 is a path injection vulnerability identified in Logpoint versions before 7.4.0. The flaw arises during the process of adding a CSV enrichment source, specifically through the source_name parameter. This parameter is intended to specify the name of the CSV file to be used for enrichment purposes. However, due to insufficient input validation, an attacker can supply an absolute path instead of a simple filename. This manipulation causes the system to write the CSV file to an arbitrary location within the /tmp directory. The vulnerability is classified under CWE-91 (Path Injection), which typically allows attackers to influence file system operations by injecting malicious path data. Exploiting this vulnerability does not require authentication or user interaction, and the attack vector is network-based (AV:N). The impact is limited to availability, as the attacker could overwrite or create files in /tmp, potentially disrupting system processes or causing denial of service. Confidentiality and integrity are not directly affected. The CVSS 3.1 base score is 5.3, reflecting medium severity. No patches or exploits are currently publicly available, but the issue is documented and should be addressed promptly. This vulnerability highlights the importance of strict input validation and sanitization when handling file paths in software components.
Potential Impact
The primary impact of CVE-2024-33858 is on system availability. By allowing an attacker to write files to arbitrary locations within the /tmp directory, the vulnerability could be exploited to overwrite critical temporary files or place malicious files that disrupt Logpoint's normal operation or other system processes relying on /tmp. This could lead to denial of service conditions or unexpected behavior in the affected system. Since the vulnerability does not affect confidentiality or integrity, sensitive data exposure or unauthorized data modification is unlikely. However, the ability to write files without authentication or user interaction increases the risk surface, especially in environments where Logpoint is exposed to untrusted networks. Organizations relying on Logpoint for security information and event management (SIEM) could face operational disruptions, impacting their security monitoring capabilities. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers could develop exploits once the vulnerability details are public. Overall, the impact is moderate but significant enough to warrant timely remediation.
Mitigation Recommendations
To mitigate CVE-2024-33858, organizations should take the following specific actions: 1) Upgrade Logpoint to version 7.4.0 or later once the patch is officially released, as this will address the vulnerability directly. 2) Until a patch is available, implement strict input validation and sanitization on the source_name parameter to ensure it only accepts valid filenames without path traversal characters or absolute paths. 3) Restrict write permissions on the /tmp directory and monitor file creation/modification activities within /tmp to detect suspicious behavior. 4) Employ application-level controls such as web application firewalls (WAFs) to detect and block malicious payloads attempting path injection. 5) Conduct regular security audits and code reviews focusing on file handling routines to prevent similar vulnerabilities. 6) Isolate Logpoint instances in network segments with limited exposure to untrusted networks to reduce the attack surface. 7) Monitor vendor advisories and threat intelligence feeds for updates or emerging exploits related to this vulnerability. These targeted measures go beyond generic advice by focusing on the specific injection vector and operational environment of Logpoint.
Affected Countries
United States, Germany, United Kingdom, Netherlands, Australia, Canada, France, Sweden, Norway, Finland
CVE-2024-33858: n/a
Description
An issue was discovered in Logpoint before 7.4.0. A path injection vulnerability is seen while adding a CSV enrichment source. The source_name parameter could be changed to an absolute path; this will write the CSV file to that path inside the /tmp directory.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-33858 is a path injection vulnerability identified in Logpoint versions before 7.4.0. The flaw arises during the process of adding a CSV enrichment source, specifically through the source_name parameter. This parameter is intended to specify the name of the CSV file to be used for enrichment purposes. However, due to insufficient input validation, an attacker can supply an absolute path instead of a simple filename. This manipulation causes the system to write the CSV file to an arbitrary location within the /tmp directory. The vulnerability is classified under CWE-91 (Path Injection), which typically allows attackers to influence file system operations by injecting malicious path data. Exploiting this vulnerability does not require authentication or user interaction, and the attack vector is network-based (AV:N). The impact is limited to availability, as the attacker could overwrite or create files in /tmp, potentially disrupting system processes or causing denial of service. Confidentiality and integrity are not directly affected. The CVSS 3.1 base score is 5.3, reflecting medium severity. No patches or exploits are currently publicly available, but the issue is documented and should be addressed promptly. This vulnerability highlights the importance of strict input validation and sanitization when handling file paths in software components.
Potential Impact
The primary impact of CVE-2024-33858 is on system availability. By allowing an attacker to write files to arbitrary locations within the /tmp directory, the vulnerability could be exploited to overwrite critical temporary files or place malicious files that disrupt Logpoint's normal operation or other system processes relying on /tmp. This could lead to denial of service conditions or unexpected behavior in the affected system. Since the vulnerability does not affect confidentiality or integrity, sensitive data exposure or unauthorized data modification is unlikely. However, the ability to write files without authentication or user interaction increases the risk surface, especially in environments where Logpoint is exposed to untrusted networks. Organizations relying on Logpoint for security information and event management (SIEM) could face operational disruptions, impacting their security monitoring capabilities. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers could develop exploits once the vulnerability details are public. Overall, the impact is moderate but significant enough to warrant timely remediation.
Mitigation Recommendations
To mitigate CVE-2024-33858, organizations should take the following specific actions: 1) Upgrade Logpoint to version 7.4.0 or later once the patch is officially released, as this will address the vulnerability directly. 2) Until a patch is available, implement strict input validation and sanitization on the source_name parameter to ensure it only accepts valid filenames without path traversal characters or absolute paths. 3) Restrict write permissions on the /tmp directory and monitor file creation/modification activities within /tmp to detect suspicious behavior. 4) Employ application-level controls such as web application firewalls (WAFs) to detect and block malicious payloads attempting path injection. 5) Conduct regular security audits and code reviews focusing on file handling routines to prevent similar vulnerabilities. 6) Isolate Logpoint instances in network segments with limited exposure to untrusted networks to reduce the attack surface. 7) Monitor vendor advisories and threat intelligence feeds for updates or emerging exploits related to this vulnerability. These targeted measures go beyond generic advice by focusing on the specific injection vector and operational environment of Logpoint.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-27T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c49b7ef31ef0b561f58
Added to database: 2/25/2026, 9:40:25 PM
Last enriched: 2/26/2026, 4:36:39 AM
Last updated: 4/12/2026, 3:38:08 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.