An issue was discovered in Logpoint before 7.1.1. Template injection was seen in the search template. The search template uses jinja templating for generating dynamic data. This could be abused to achieve code execution. Any user with access to create a search template can leverage this to execute code as the loginspect user.
References
Configurations
History
18 Apr 2025, 19:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:logpoint:siem:*:*:*:*:*:*:*:* | |
First Time |
Logpoint
Logpoint siem |
|
References | () https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template - Vendor Advisory |
Information
Published : 2024-04-27 23:15
Updated : 2025-04-18 19:06
NVD link : CVE-2022-48684
Mitre link : CVE-2022-48684
CVE.ORG link : CVE-2022-48684
JSON object : View
Products Affected
logpoint
- siem
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')