CVE-2024-36383

An issue was discovered in Logpoint SAML Authentication before 6.0.3. An attacker can place a crafted filename in the state field of a SAML SSO-URL response, and the file corresponding to this filename will ultimately be deleted. This can lead to a SAML Authentication login outage.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:logpoint:saml_authentication:*:*:*:*:*:*:*:*

History

30 Jun 2025, 15:22

Type Values Removed Values Added
First Time Logpoint
Logpoint saml Authentication
References () https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response - () https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response - Vendor Advisory
CPE cpe:2.3:a:logpoint:saml_authentication:*:*:*:*:*:*:*:*
CWE CWE-706

27 May 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-27 11:15

Updated : 2025-06-30 15:22


NVD link : CVE-2024-36383

Mitre link : CVE-2024-36383


JSON object : View

Products Affected

logpoint

  • saml_authentication
CWE
CWE-706

Use of Incorrectly-Resolved Name or Reference