CVE-2022-48684

An issue was discovered in Logpoint before 7.1.1. Template injection was seen in the search template. The search template uses jinja templating for generating dynamic data. This could be abused to achieve code execution. Any user with access to create a search template can leverage this to execute code as the loginspect user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:logpoint:siem:*:*:*:*:*:*:*:*

History

18 Apr 2025, 19:06

Type Values Removed Values Added
CPE cpe:2.3:a:logpoint:siem:*:*:*:*:*:*:*:*
First Time Logpoint
Logpoint siem
References () https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template - () https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template - Vendor Advisory

Information

Published : 2024-04-27 23:15

Updated : 2025-04-18 19:06


NVD link : CVE-2022-48684

Mitre link : CVE-2022-48684

CVE.ORG link : CVE-2022-48684


JSON object : View

Products Affected

logpoint

  • siem
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')