CVE-2023-32217 (GCVE-0-2023-32217)
Vulnerability from cvelistv5 – Published: 2023-05-31 00:00 – Updated: 2025-01-10 15:40
VLAI?
Summary
IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6 allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.
Severity ?
9 (Critical)
CWE
- CWE-470 - Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| SailPoint | IdentityIQ |
Affected:
8.3 , ≤ 8.3p2
(semver)
Affected: 8.2 , ≤ 8.2p5 (semver) Affected: 8.1 , ≤ 8.1p6 (semver) Affected: 8.0 , ≤ 8.0p5 (semver) |
Credits
Recurity Labs GmbH
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:10:23.943Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-32217",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-10T15:40:05.443644Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-10T15:40:35.132Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "IdentityIQ",
"vendor": "SailPoint",
"versions": [
{
"lessThanOrEqual": "8.3p2",
"status": "affected",
"version": "8.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.2p5",
"status": "affected",
"version": "8.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.1p6",
"status": "affected",
"version": "8.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.0p5",
"status": "affected",
"version": "8.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Recurity Labs GmbH"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u0026nbsp;allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-138",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-138 Reflection Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-470",
"description": "CWE-470 Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-05T03:55:37.447Z",
"orgId": "2cfc7547-56a0-4049-8b52-c3078e8a8719",
"shortName": "SailPoint"
},
"references": [
{
"url": "https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "SailPoint IdentityIQ Unsafe use of Reflection Vulnerability",
"x_generator": {
"engine": "SecretariatVulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7547-56a0-4049-8b52-c3078e8a8719",
"assignerShortName": "SailPoint",
"cveId": "CVE-2023-32217",
"datePublished": "2023-05-31T00:00:00",
"dateReserved": "2023-05-04T20:01:49.973Z",
"dateUpdated": "2025-01-10T15:40:35.132Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"331C62A4-620B-483A-87A6-9AA51679AF92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.0:patch1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C84FC633-5B3C-4A40-A588-EF3AF509BBE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.0:patch2:*:*:*:*:*:*\", \"matchCriteriaId\": \"6080940F-819D-468F-90B7-D1E135020777\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.0:patch3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E018B45E-96CF-45C2-B405-3AFCC683BF9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.0:patch4:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE18C753-3EE9-49C4-A99F-4429E0B20A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"00C8E5FB-5B6D-4C1B-AEFE-C884B28392D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.1:patch1:*:*:*:*:*:*\", \"matchCriteriaId\": \"216615A8-0E21-4597-871C-AC121BF0E150\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.1:patch2:*:*:*:*:*:*\", \"matchCriteriaId\": \"35ECC22F-B2A2-4750-B995-2944F12C1BFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.1:patch3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ECEF57B-DA34-402A-86F0-713A3683A172\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.1:patch4:*:*:*:*:*:*\", \"matchCriteriaId\": \"1815D4C7-50FC-45DA-8130-E9258CAFBD09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.1:patch5:*:*:*:*:*:*\", \"matchCriteriaId\": \"F784765E-8B3C-4F96-B57A-E6E7AECE628C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"224129BF-667F-4F6A-8E9A-15390F6FA3D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.2:patch1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A8C2668-C1F1-4A67-A2B3-99B5746C6A52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.2:patch2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9D91EB5-EC8E-4200-9245-13E37312343D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.2:patch4:*:*:*:*:*:*\", \"matchCriteriaId\": \"63352C53-ADD8-49CD-B9E6-648183BDED68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"1173CC53-CBE5-450C-96BF-8583D1B3D185\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sailpoint:identityiq:8.3:patch1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C0F5E55-5D33-425F-9DA7-49FE66CD84C4\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\\n\\n\"}]",
"id": "CVE-2023-32217",
"lastModified": "2024-11-21T08:02:55.330",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@sailpoint.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2023-06-05T04:15:10.927",
"references": "[{\"url\": \"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\", \"source\": \"psirt@sailpoint.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@sailpoint.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"psirt@sailpoint.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-470\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-470\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-32217\",\"sourceIdentifier\":\"psirt@sailpoint.com\",\"published\":\"2023-06-05T04:15:10.927\",\"lastModified\":\"2024-11-21T08:02:55.330\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\\n\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@sailpoint.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@sailpoint.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-470\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-470\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"331C62A4-620B-483A-87A6-9AA51679AF92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C84FC633-5B3C-4A40-A588-EF3AF509BBE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6080940F-819D-468F-90B7-D1E135020777\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E018B45E-96CF-45C2-B405-3AFCC683BF9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.0:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE18C753-3EE9-49C4-A99F-4429E0B20A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C8E5FB-5B6D-4C1B-AEFE-C884B28392D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"216615A8-0E21-4597-871C-AC121BF0E150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"35ECC22F-B2A2-4750-B995-2944F12C1BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ECEF57B-DA34-402A-86F0-713A3683A172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1815D4C7-50FC-45DA-8130-E9258CAFBD09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F784765E-8B3C-4F96-B57A-E6E7AECE628C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"224129BF-667F-4F6A-8E9A-15390F6FA3D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8C2668-C1F1-4A67-A2B3-99B5746C6A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D91EB5-EC8E-4200-9245-13E37312343D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"63352C53-ADD8-49CD-B9E6-648183BDED68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1173CC53-CBE5-450C-96BF-8583D1B3D185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.3:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0F5E55-5D33-425F-9DA7-49FE66CD84C4\"}]}]}],\"references\":[{\"url\":\"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\",\"source\":\"psirt@sailpoint.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T15:10:23.943Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-32217\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-10T15:40:05.443644Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-10T15:40:10.920Z\"}}], \"cna\": {\"title\": \"SailPoint IdentityIQ Unsafe use of Reflection Vulnerability\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Recurity Labs GmbH\"}], \"impacts\": [{\"capecId\": \"CAPEC-138\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-138 Reflection Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"SailPoint\", \"product\": \"IdentityIQ\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.3p2\"}, {\"status\": \"affected\", \"version\": \"8.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2p5\"}, {\"status\": \"affected\", \"version\": \"8.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1p6\"}, {\"status\": \"affected\", \"version\": \"8.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0p5\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use-of-reflection-vulnerability-cve-2023-32217/\"}], \"x_generator\": {\"engine\": \"SecretariatVulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\\u00a0allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6\u0026nbsp;allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-470\", \"description\": \"CWE-470 Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"2cfc7547-56a0-4049-8b52-c3078e8a8719\", \"shortName\": \"SailPoint\", \"dateUpdated\": \"2023-06-05T03:55:37.447Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-32217\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-10T15:40:35.132Z\", \"dateReserved\": \"2023-05-04T20:01:49.973Z\", \"assignerOrgId\": \"2cfc7547-56a0-4049-8b52-c3078e8a8719\", \"datePublished\": \"2023-05-31T00:00:00\", \"assignerShortName\": \"SailPoint\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…