Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7564: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Logsign Unified SecOps Platform

0
Medium
VulnerabilityCVE-2024-7564cvecve-2024-7564cwe-22
Published: Tue Aug 06 2024 (08/06/2024, 15:47:49 UTC)
Source: CVE Database V5
Vendor/Project: Logsign
Product: Unified SecOps Platform

Description

Logsign Unified SecOps Platform Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the get_response_json_result endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-24680.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 03:43:03 UTC

Technical Analysis

CVE-2024-7564 is a directory traversal vulnerability classified under CWE-22 affecting Logsign Unified SecOps Platform version 6.4.11. The flaw exists in the get_response_json_result endpoint, where the application fails to properly validate and sanitize user-supplied path inputs before performing file operations. This improper limitation allows an authenticated attacker to traverse directories and access files outside the intended restricted directory, potentially disclosing sensitive information with root-level privileges. The vulnerability requires authentication but no user interaction, making it exploitable remotely by any user with valid credentials. The CVSS v3.0 base score is 4.3, reflecting low complexity and limited impact confined to confidentiality. No integrity or availability impacts are reported. The vulnerability was assigned and published by the Zero Day Initiative (ZDI) as ZDI-CAN-24680 on August 6, 2024. No patches or public exploits are currently available, but the risk of sensitive data leakage is significant in environments where attackers can authenticate. This vulnerability highlights the importance of strict input validation and access control in security platforms managing sensitive operational data.

Potential Impact

The primary impact of CVE-2024-7564 is unauthorized disclosure of sensitive information stored on systems running Logsign Unified SecOps Platform 6.4.11. Since the vulnerability allows reading files with root privileges, attackers could access configuration files, logs, credentials, or other critical data, potentially facilitating further attacks or espionage. The requirement for authentication limits exploitation to insiders or attackers who have compromised credentials, reducing the attack surface but not eliminating risk. Organizations relying on this platform for security operations could face confidentiality breaches, undermining trust and compliance with data protection regulations. Although integrity and availability are not directly affected, the exposure of sensitive data could lead to indirect impacts such as targeted attacks, data leaks, or reputational damage. The absence of known exploits currently reduces immediate risk, but the vulnerability remains a significant concern for environments with high-value data and privileged users.

Mitigation Recommendations

To mitigate CVE-2024-7564, organizations should first verify if they are running Logsign Unified SecOps Platform version 6.4.11 and restrict access to the get_response_json_result endpoint to trusted users only. Since no official patch is currently available, administrators should implement strict access controls and monitor authentication logs for suspicious activity. Employ network segmentation and firewall rules to limit platform access to essential personnel and systems. Additionally, conduct regular credential audits and enforce strong authentication mechanisms to reduce the risk of compromised accounts. Implement application-layer input validation proxies or web application firewalls (WAFs) that can detect and block path traversal attempts targeting this endpoint. Finally, maintain close communication with the vendor for timely patch releases and apply updates promptly once available. Conduct thorough security assessments and penetration testing to identify any exploitation attempts or related vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-08-06T15:47:33.796Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c1ab7ef31ef0b55fef3

Added to database: 2/25/2026, 9:39:38 PM

Last enriched: 2/26/2026, 3:43:03 AM

Last updated: 4/12/2026, 5:14:21 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses