Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7602: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Logsign Unified SecOps Platform

0
Medium
VulnerabilityCVE-2024-7602cvecve-2024-7602cwe-22
Published: Wed Aug 21 2024 (08/21/2024, 16:06:09 UTC)
Source: CVE Database V5
Vendor/Project: Logsign
Product: Unified SecOps Platform

Description

Logsign Unified SecOps Platform Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-25027.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 01:53:40 UTC

Technical Analysis

CVE-2024-7602 is a directory traversal vulnerability classified under CWE-22 affecting Logsign Unified SecOps Platform version 6.4.20. The flaw arises from insufficient validation of user-supplied file paths in the platform's HTTP API service, which operates over HTTPS on TCP port 443. An authenticated attacker can manipulate path parameters to traverse directories outside the intended restricted directory, thereby accessing arbitrary files on the underlying system. Since the API runs with root privileges, the attacker can disclose highly sensitive information, potentially including system configuration files, credentials, or logs. The vulnerability does not require user interaction but does require valid authentication credentials, which could be obtained through legitimate user accounts or compromised credentials. The CVSS v3.0 base score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on this platform for security operations and monitoring. The lack of proper input sanitization in file path handling is the root cause, emphasizing the need for strict validation and sanitization of user inputs in API endpoints.

Potential Impact

The primary impact of CVE-2024-7602 is unauthorized disclosure of sensitive information due to directory traversal. Attackers with valid credentials can access files outside the intended directory scope, potentially exposing critical system files, security logs, or credentials. This can lead to further compromise, including privilege escalation or lateral movement within the network. Organizations using Logsign Unified SecOps Platform may face data breaches, loss of confidentiality, and erosion of trust in their security monitoring infrastructure. Since the API runs with root privileges, the scope of accessible data is extensive, increasing the risk severity. The vulnerability does not directly affect system integrity or availability but can be a stepping stone for more severe attacks. The requirement for authentication limits exploitation to insiders or attackers who have compromised credentials, but this does not diminish the risk for organizations with weak credential management or insider threats.

Mitigation Recommendations

1. Apply patches or updates from Logsign as soon as they become available to address this vulnerability. 2. In the absence of an official patch, implement strict input validation and sanitization on the HTTP API service to reject any path traversal sequences such as '../'. 3. Restrict access to the HTTP API service to trusted networks and users only, using network segmentation and firewall rules. 4. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 5. Monitor and audit API access logs for unusual file access patterns or attempts to access unauthorized paths. 6. Limit the privileges of the API service process if possible, avoiding root-level execution to minimize impact. 7. Educate administrators and users about the risks of credential sharing and phishing to prevent unauthorized access. 8. Conduct regular security assessments and penetration testing focusing on API endpoints to detect similar vulnerabilities early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-08-08T00:16:51.521Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c1ab7ef31ef0b55ff6d

Added to database: 2/25/2026, 9:39:38 PM

Last enriched: 2/28/2026, 1:53:40 AM

Last updated: 4/12/2026, 11:50:02 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses