9

CVE-2023-32217

IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6 allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SailpointIdentityiq Version8.0 Update-
SailpointIdentityiq Version8.0 Updatepatch1
SailpointIdentityiq Version8.0 Updatepatch2
SailpointIdentityiq Version8.0 Updatepatch3
SailpointIdentityiq Version8.0 Updatepatch4
SailpointIdentityiq Version8.1 Update-
SailpointIdentityiq Version8.1 Updatepatch1
SailpointIdentityiq Version8.1 Updatepatch2
SailpointIdentityiq Version8.1 Updatepatch3
SailpointIdentityiq Version8.1 Updatepatch4
SailpointIdentityiq Version8.1 Updatepatch5
SailpointIdentityiq Version8.2 Update-
SailpointIdentityiq Version8.2 Updatepatch1
SailpointIdentityiq Version8.2 Updatepatch2
SailpointIdentityiq Version8.2 Updatepatch4
SailpointIdentityiq Version8.3 Update-
SailpointIdentityiq Version8.3 Updatepatch1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.98% 0.765
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
psirt@sailpoint.com 9 2.3 6
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.