Advisory ID: LVD-2024-007
CVSSv 3.1 Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSSv 3.1 Base Score: 9.1
Severity: Critical
CVE: CVE-2024-36383
CWE: CWE-73
Date Published: 2024-05-27
Description:
The state parameter in the SAML SSO-URL response could be injected, causing arbitrary file deletion. Due to this, sometimes users could not log in using SAML Authentication.
Affected Product:
SAML Authentication v6.0.2
Upgrade to SAML Authentication v6.0.3
Acknowledgments: -
Advisory ID: LVD-2024-0005
CVSSv 3.1 Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSSv 3.1 Base Score: 6.5
Severity: Medium
CVE: CVE-2024-33860
CWE: CWE-73
Date Published: 2024-04-30
Description:
Logpoint before v7.4.0 is vulnerable to Local File Inclusion (LFI) attacks when an arbitrary File Path is used within the File System Collector. The content of the file specified can be viewed in the incoming logs.
Affected Product:
Logpoint versions before 7.4.0
Upgrade to Logpoint v7.4.0
Acknowledgments: -
Advisory ID: LVD-2024-0004
CVSSv 3.1 Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSSv 3.1 Base Score: 5.4
Severity: Medium
CVE: CVE-2024-33859
CWE: CWE-79
Date Published: 2024-04-30
Description:
HTML code sent through logs wasn't being escaped in the Interesting Field in the UI, leading to XSS attack.
Affected Product:
Logpoint versions before 7.4.0
Upgrade to Logpoint v7.4.0
Acknowledgments:
Jan Henrik Reimers
Hamburger Energiewerke
Advisory ID: LVD-2024-0006
CVSSv 3.1 Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSSv 3.1 Base Score: 4.3
Severity: Medium
CVE: CVE-2024-33858
CWE: CWE-73
Date Published: 2024-04-30
Description:
A path injection vulnerability is seen while adding a CSV enrichment source. The source_name parameter could be changed to an absolute path; this will write the CSV file to that path inside the /tmp directory.
Affected Product:
Logpoint versions before 7.4.0
Upgrade to Logpoint v7.4.0
Acknowledgments: -
Advisory ID: LVD-2024-0003
CVSSv 3.1 Vector: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
CVSSv 3.1 Base Score: 9.6
Severity: Critical
CVE: CVE-2024-33857
CWE: CWE-918
Date Published: 2024-04-30
Description:
Due to a lack of input validation on URLs in Threat Intelligence, an attacker with low-level access to the system can trigger Server Side Request Forgery.
Affected Product:
Logpoint versions before 7.4.0
Upgrade to Logpoint v7.4.0
Acknowledgments: -
Advisory ID: LVD-2024-0002
CVSSv 3.1 Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSSv 3.1 Base Score: 5.3
Severity: Medium
CVE: CVE-2024-33856
CWE: CWE-204
Date Published: 2024-04-30
Description:
An attacker can enumerate a valid list of usernames by observing the response time at the Forgot Password endpoint.
Affected Product:
Logpoint versions before 7.4.0
Upgrade to Logpoint v7.4.0
Acknowledgments: -
Advisory ID: LVD-2024-0001
CVSSv 3.1 Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSSv 3.1 Base Score: 4.3
Severity: Medium
CVE: CVE-2024-30176
CWE: CWE-200, CWE-204
Date Published: 2024-04-25
Description:
In Logpoint versions before 7.4.0, attackers could enumerate a valid list of usernames using publicly exposed URLs of shared widgets.
Affected Product:
Logpoint versions before 7.4.0
Upgrade to Logpoint v7.4.0
Acknowledgments:
Hannes Fleisch
Advisory ID: LVD-2022-0002
CVSSv 3.1 Vector: AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:H/RL:U/RC:C
CVSSv 3.1 Base Score: 8.4
Severity: High
CVE: CVE-2022-48684
CWE: CWE-1336, CWE-78
Date Published: 2022-09-28
Last Updated: 2022-10-12
Template injection was seen in the search template. The search template uses jinja templating for generating dynamic data. This could be abused to gain code execution. Any user with the access to create a search template can use this vulnerability to execute code in the system as loginspect user.
Upgrade to Logpoint version 7.1.1.
Acknowledgments
Timo Fahlenbock, IT Manager for StrikoWestofen GmbH in Norican Group (DISA)
Advisory ID: LVD-2022-0003
CVSSv 3.1 Vector: AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:H/RL:U/RC:C
CVSSv 3.1 Base Score: 7.2
Severity: High
CVE: CVE-2022-48685
CWE: CWE-732
Date Published: 2022-11-30
Last Updated: 2022-12-02
Description
The daily executed Cronjob-File clean_secbi_old_logs in Logpoint 7.1 Installation is writable for all users. The Cron is executed as root; any user can use this to execute any command in the system as root.
Affected Product
Logpoint v7.0.0 to v7.1.1
Upgrade Logpoint to v7.1.2
Acknowledgments
Timo Fahlenbock, IT Manager for StrikoWestofen GmbH in Norican Group (DISA)
Advisory ID: LVD-2023-0001
CVSSv 3.1 Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVSSv 3.1 Base Score: 5.4
Severity: Medium
CVE: CVE-2023-49950
CWE: CWE-79, CWE-20
Date Published: 2023-10-12
Description
Crafted XSS payloads could be sent through logs. Alerts configured with such logs when rendered through a custom Jinja template caused XSS injection.
A successful exploit could allow attackers to steal sensitive information.
Affected Product
Logpoint v6.10.0 to v7.2.4
Upgrade to Logpoint v7.3.0 or later
Acknowledgments
Ash Scott, Security Researcher, Shrike InfoSec
Advisory ID: LVD-2022-0001
CVSSv 3.1 Vector: AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
CVSSv 3.1 Base Score: 4.8
Severity: Medium
CVE: CVE-2024-29865
CWE: CWE-79
Date Published: 2024-03-22
Description:
Self Cross-site scripting (Self-XSS) was seen on the LDAP authentication page because the username field on the LDAP login form was not sanitized.
Affected Product:
Logpoint v7.0.1 and earlier
Upgrade to Logpoint v7.1.0
Acknowledgments:
Marcus Nilsson and Christian Rellmann from USD.