Logo
Resources
Documentation Portal Ideas Portal Logpoint Academy License Portal
Resources
Documentation Portal Ideas Portal Logpoint Academy License Portal
Sign in
  1. Logpoint Service Desk
  2. Products Hub
  3. Product Security

Authentication Bypass using URL endpoints in the Authentication Modules

Avatar Kripa Thapa
February 04, 2025 08:41
Follow

Advisory ID: LVD-2024-010

CVSSv 4.0 Vector: AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

CVSSv 4.0 Base Score: 7.7

Severity: High

CVE: CVE-2024-48953

CWE: CWE-288

Date Published: 2024-10-02

Description:

Endpoints for creating, editing, or deleting third-party authentication modules lacked proper authorization checks. This allowed unauthenticated users to register their own authentication plugins in Logpoint, resulting in unauthorized access.

Affected Product:

Logpoint versions prior to 7.5.0.

Solution:

Upgrade to Logpoint v7.5.0.

Acknowledgments:

Mehmet D. Ince

Sr. Vulnerability Researcher

Prodaft

Comments

Article is closed for comments.

Related articles

  • Remote Code Execution (RCE) in EventHub Collector
  • Server-Side Request Forgery (SSRF) on SOAR, results in authentication bypass
  • Static JWT Key enables unauthorized API access
  • Server-Side Template Injection (SSTI) in Search Template Dashboard Queries
  • Arbitrary file deletion through URL Injection to SAML SSO-URL Response
Was this article helpful?
0 out of 0 found this helpful
Privacy policy    EULA    Terms of service   
Copyright © , Logpoint. All rights reserved.

Note: We use cookies that are essential for the smooth functioning of our website.