CVE-2024-2227 (GCVE-0-2024-2227)
Vulnerability from cvelistv5 – Published: 2024-03-22 15:43 – Updated: 2024-08-01 19:03
VLAI?
Summary
This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227.
Severity ?
10 (Critical)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| SailPoint | IdentityIQ |
Affected:
8.1 , < 8.1p7
(semver)
Affected: 8.2 , < 8.2p7 (semver) Affected: 8.3 , < 8.3p4 (semver) Affected: 8.4 , < 8.4p1 (semver) |
Credits
Jose Domingo Carillo Lencina, 0xd0m7
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:sailpoint:identityiq:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "identityiq",
"vendor": "sailpoint",
"versions": [
{
"lessThan": "8.1p7",
"status": "affected",
"version": "8.1",
"versionType": "custom"
},
{
"lessThan": "8.2p7",
"status": "affected",
"version": "8.2",
"versionType": "custom"
},
{
"lessThan": "8.3p4",
"status": "affected",
"version": "8.3",
"versionType": "custom"
},
{
"lessThan": "8.4p1",
"status": "affected",
"version": "8.4",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-2227",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-30T04:00:58.434391Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-01T18:45:07.233Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:03:39.142Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.sailpoint.com/security-advisories/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "IdentityIQ",
"vendor": "SailPoint",
"versions": [
{
"lessThan": "8.1p7",
"status": "affected",
"version": "8.1",
"versionType": "semver"
},
{
"lessThan": "8.2p7",
"status": "affected",
"version": "8.2",
"versionType": "semver"
},
{
"lessThan": "8.3p4",
"status": "affected",
"version": "8.3",
"versionType": "semver"
},
{
"lessThan": "8.4p1",
"status": "affected",
"version": "8.4",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jose Domingo Carillo Lencina, 0xd0m7"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227."
}
],
"value": "This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227."
}
],
"impacts": [
{
"capecId": "CAPEC-126",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-126 Path Traversal"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-22T15:43:12.869Z",
"orgId": "2cfc7547-56a0-4049-8b52-c3078e8a8719",
"shortName": "SailPoint"
},
"references": [
{
"url": "https://www.sailpoint.com/security-advisories/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IdentityIQ JavaServer Faces File Path Traversal Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "2cfc7547-56a0-4049-8b52-c3078e8a8719",
"assignerShortName": "SailPoint",
"cveId": "CVE-2024-2227",
"datePublished": "2024-03-22T15:43:12.869Z",
"dateReserved": "2024-03-06T17:01:38.789Z",
"dateUpdated": "2024-08-01T19:03:39.142Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227.\"}, {\"lang\": \"es\", \"value\": \"Esta vulnerabilidad permite el acceso a archivos arbitrarios en el sistema de archivos del servidor de aplicaciones debido a una vulnerabilidad de path traversal en JavaServer Faces (JSF) 2.2.20 documentada en CVE-2020-6950. La soluci\\u00f3n para esta vulnerabilidad contenida en esta soluci\\u00f3n de seguridad proporciona cambios adicionales a la soluci\\u00f3n anunciada en mayo de 2021 rastreada por ETN IIQSAW-3585 y en enero de 2024 rastreada por IIQFW-336. Esta vulnerabilidad en IdentityIQ tiene asignada CVE-2024-2227.\"}]",
"id": "CVE-2024-2227",
"lastModified": "2024-11-21T09:09:18.000",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@sailpoint.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 10.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 6.0}]}",
"published": "2024-03-22T16:15:09.253",
"references": "[{\"url\": \"https://www.sailpoint.com/security-advisories/\", \"source\": \"psirt@sailpoint.com\"}, {\"url\": \"https://www.sailpoint.com/security-advisories/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "psirt@sailpoint.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"psirt@sailpoint.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-2227\",\"sourceIdentifier\":\"psirt@sailpoint.com\",\"published\":\"2024-03-22T16:15:09.253\",\"lastModified\":\"2025-11-12T20:20:36.150\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227.\"},{\"lang\":\"es\",\"value\":\"Esta vulnerabilidad permite el acceso a archivos arbitrarios en el sistema de archivos del servidor de aplicaciones debido a una vulnerabilidad de path traversal en JavaServer Faces (JSF) 2.2.20 documentada en CVE-2020-6950. La soluci\u00f3n para esta vulnerabilidad contenida en esta soluci\u00f3n de seguridad proporciona cambios adicionales a la soluci\u00f3n anunciada en mayo de 2021 rastreada por ETN IIQSAW-3585 y en enero de 2024 rastreada por IIQFW-336. Esta vulnerabilidad en IdentityIQ tiene asignada CVE-2024-2227.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@sailpoint.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"psirt@sailpoint.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.1\",\"matchCriteriaId\":\"C76617A8-395F-4165-983E-9B9E77DFAA10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"216615A8-0E21-4597-871C-AC121BF0E150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"35ECC22F-B2A2-4750-B995-2944F12C1BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ECEF57B-DA34-402A-86F0-713A3683A172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1815D4C7-50FC-45DA-8130-E9258CAFBD09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F784765E-8B3C-4F96-B57A-E6E7AECE628C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.1:patch6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B4F481-4E74-4B56-9851-E1A665F5783D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"224129BF-667F-4F6A-8E9A-15390F6FA3D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8C2668-C1F1-4A67-A2B3-99B5746C6A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D91EB5-EC8E-4200-9245-13E37312343D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"63352C53-ADD8-49CD-B9E6-648183BDED68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.2:patch5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBDD484D-BF0D-4246-9701-0BF3DD2194E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1173CC53-CBE5-450C-96BF-8583D1B3D185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.3:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0F5E55-5D33-425F-9DA7-49FE66CD84C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.3:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A2FD228-E6DB-49E3-BE3E-1BF9B0434FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sailpoint:identityiq:8.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC4F08D-A3FB-41F6-8EFD-6F34FBC0F75F\"}]}]}],\"references\":[{\"url\":\"https://www.sailpoint.com/security-advisories/\",\"source\":\"psirt@sailpoint.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.sailpoint.com/security-advisories/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.sailpoint.com/security-advisories/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T19:03:39.142Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-2227\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-30T04:00:58.434391Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:sailpoint:identityiq:*:*:*:*:*:*:*:*\"], \"vendor\": \"sailpoint\", \"product\": \"identityiq\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.1\", \"lessThan\": \"8.1p7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.2\", \"lessThan\": \"8.2p7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.3\", \"lessThan\": \"8.3p4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.4\", \"lessThan\": \"8.4p1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-01T18:43:33.871Z\"}}], \"cna\": {\"title\": \"IdentityIQ JavaServer Faces File Path Traversal Vulnerability\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Jose Domingo Carillo Lencina, 0xd0m7\"}], \"impacts\": [{\"capecId\": \"CAPEC-126\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-126 Path Traversal\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 10, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"SailPoint\", \"product\": \"IdentityIQ\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.1\", \"lessThan\": \"8.1p7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"8.2\", \"lessThan\": \"8.2p7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"8.3\", \"lessThan\": \"8.3p4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"8.4\", \"lessThan\": \"8.4p1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://www.sailpoint.com/security-advisories/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"2cfc7547-56a0-4049-8b52-c3078e8a8719\", \"shortName\": \"SailPoint\", \"dateUpdated\": \"2024-03-22T15:43:12.869Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-2227\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T19:03:39.142Z\", \"dateReserved\": \"2024-03-06T17:01:38.789Z\", \"assignerOrgId\": \"2cfc7547-56a0-4049-8b52-c3078e8a8719\", \"datePublished\": \"2024-03-22T15:43:12.869Z\", \"assignerShortName\": \"SailPoint\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…