CVE-2023-32217 (GCVE-0-2023-32217)
Vulnerability from cvelistv5
Published
2023-05-31 00:00
Modified
2025-01-10 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-470 - Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
Summary
IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6 allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SailPoint | IdentityIQ |
Version: 8.3 ≤ 8.3p2 Version: 8.2 ≤ 8.2p5 Version: 8.1 ≤ 8.1p6 Version: 8.0 ≤ 8.0p5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:10:23.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32217", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-10T15:40:05.443644Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-10T15:40:35.132Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "IdentityIQ", "vendor": "SailPoint", "versions": [ { "lessThanOrEqual": "8.3p2", "status": "affected", "version": "8.3", "versionType": "semver" }, { "lessThanOrEqual": "8.2p5", "status": "affected", "version": "8.2", "versionType": "semver" }, { "lessThanOrEqual": "8.1p6", "status": "affected", "version": "8.1", "versionType": "semver" }, { "lessThanOrEqual": "8.0p5", "status": "affected", "version": "8.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Recurity Labs GmbH" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u0026nbsp;allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\u003cbr\u003e\u003cbr\u003e" } ], "value": "IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\n\n" } ], "impacts": [ { "capecId": "CAPEC-138", "descriptions": [ { "lang": "en", "value": "CAPEC-138 Reflection Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-470", "description": "CWE-470 Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-05T03:55:37.447Z", "orgId": "2cfc7547-56a0-4049-8b52-c3078e8a8719", "shortName": "SailPoint" }, "references": [ { "url": "https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/" } ], "source": { "discovery": "EXTERNAL" }, "title": "SailPoint IdentityIQ Unsafe use of Reflection Vulnerability", "x_generator": { "engine": "SecretariatVulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2cfc7547-56a0-4049-8b52-c3078e8a8719", "assignerShortName": "SailPoint", "cveId": "CVE-2023-32217", "datePublished": "2023-05-31T00:00:00", "dateReserved": "2023-05-04T20:01:49.973Z", "dateUpdated": "2025-01-10T15:40:35.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-32217\",\"sourceIdentifier\":\"psirt@sailpoint.com\",\"published\":\"2023-06-05T04:15:10.927\",\"lastModified\":\"2024-11-21T08:02:55.330\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\\n\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@sailpoint.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@sailpoint.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-470\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-470\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"331C62A4-620B-483A-87A6-9AA51679AF92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C84FC633-5B3C-4A40-A588-EF3AF509BBE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6080940F-819D-468F-90B7-D1E135020777\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E018B45E-96CF-45C2-B405-3AFCC683BF9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE18C753-3EE9-49C4-A99F-4429E0B20A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C8E5FB-5B6D-4C1B-AEFE-C884B28392D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"216615A8-0E21-4597-871C-AC121BF0E150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"35ECC22F-B2A2-4750-B995-2944F12C1BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ECEF57B-DA34-402A-86F0-713A3683A172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1815D4C7-50FC-45DA-8130-E9258CAFBD09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F784765E-8B3C-4F96-B57A-E6E7AECE628C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"224129BF-667F-4F6A-8E9A-15390F6FA3D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8C2668-C1F1-4A67-A2B3-99B5746C6A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D91EB5-EC8E-4200-9245-13E37312343D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"63352C53-ADD8-49CD-B9E6-648183BDED68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1173CC53-CBE5-450C-96BF-8583D1B3D185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.3:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0F5E55-5D33-425F-9DA7-49FE66CD84C4\"}]}]}],\"references\":[{\"url\":\"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\",\"source\":\"psirt@sailpoint.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T15:10:23.943Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-32217\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-10T15:40:05.443644Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-10T15:40:10.920Z\"}}], \"cna\": {\"title\": \"SailPoint IdentityIQ Unsafe use of Reflection Vulnerability\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Recurity Labs GmbH\"}], \"impacts\": [{\"capecId\": \"CAPEC-138\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-138 Reflection Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"SailPoint\", \"product\": \"IdentityIQ\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.3p2\"}, {\"status\": \"affected\", \"version\": \"8.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2p5\"}, {\"status\": \"affected\", \"version\": \"8.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1p6\"}, {\"status\": \"affected\", \"version\": \"8.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0p5\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\"}], \"x_generator\": {\"engine\": \"SecretariatVulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u0026nbsp;allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-470\", \"description\": \"CWE-470 Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"2cfc7547-56a0-4049-8b52-c3078e8a8719\", \"shortName\": \"SailPoint\", \"dateUpdated\": \"2023-06-05T03:55:37.447Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-32217\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-10T15:40:35.132Z\", \"dateReserved\": \"2023-05-04T20:01:49.973Z\", \"assignerOrgId\": \"2cfc7547-56a0-4049-8b52-c3078e8a8719\", \"datePublished\": \"2023-05-31T00:00:00\", \"assignerShortName\": \"SailPoint\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…