An issue was discovered in Logpoint before 7.1.1. Template injection was seen in the search template. The search template uses jinja templating for generating dynamic data. This could be abused to achieve code execution. Any user with access to create a search template can leverage this to execute code as the loginspect user.
References
Configurations
History
18 Apr 2025, 19:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template - Vendor Advisory | |
First Time |
Logpoint siem
Logpoint |
|
CPE | cpe:2.3:a:logpoint:siem:*:*:*:*:*:*:*:* |
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://servicedesk.logpoint.com/hc/en-us/articles/7201134201885-Template-injection-in-Search-Template - |
25 Oct 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE |
03 Jul 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-1336 CWE-78 |
27 Apr 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-27 23:15
Updated : 2025-04-18 19:06
NVD link : CVE-2022-48684
Mitre link : CVE-2022-48684
CVE.ORG link : CVE-2022-48684
JSON object : View
Products Affected
logpoint
- siem
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')