CVE-2024-36383

An issue was discovered in Logpoint SAML Authentication before 6.0.3. An attacker can place a crafted filename in the state field of a SAML SSO-URL response, and the file corresponding to this filename will ultimately be deleted. This can lead to a SAML Authentication login outage.
Configurations

Configuration 1 (hide)

cpe:2.3:a:logpoint:saml_authentication:*:*:*:*:*:*:*:*

History

30 Jun 2025, 15:22

Type Values Removed Values Added
First Time Logpoint
Logpoint saml Authentication
CWE CWE-706
CPE cpe:2.3:a:logpoint:saml_authentication:*:*:*:*:*:*:*:*
References () https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response - () https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response - Vendor Advisory

Information

Published : 2024-05-27 11:15

Updated : 2025-06-30 15:22


NVD link : CVE-2024-36383

Mitre link : CVE-2024-36383

CVE.ORG link : CVE-2024-36383


JSON object : View

Products Affected

logpoint

  • saml_authentication
CWE
CWE-706

Use of Incorrectly-Resolved Name or Reference