CVE Vulnerabilities

CVE-2023-32217

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Jun 05, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6 allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath.

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

NameVendorStart VersionEnd Version
IdentityiqSailpoint8.0 (including)8.0 (including)
IdentityiqSailpoint8.0-patch1 (including)8.0-patch1 (including)
IdentityiqSailpoint8.0-patch2 (including)8.0-patch2 (including)
IdentityiqSailpoint8.0-patch3 (including)8.0-patch3 (including)
IdentityiqSailpoint8.0-patch4 (including)8.0-patch4 (including)
IdentityiqSailpoint8.1 (including)8.1 (including)
IdentityiqSailpoint8.1-patch1 (including)8.1-patch1 (including)
IdentityiqSailpoint8.1-patch2 (including)8.1-patch2 (including)
IdentityiqSailpoint8.1-patch3 (including)8.1-patch3 (including)
IdentityiqSailpoint8.1-patch4 (including)8.1-patch4 (including)
IdentityiqSailpoint8.1-patch5 (including)8.1-patch5 (including)
IdentityiqSailpoint8.2 (including)8.2 (including)
IdentityiqSailpoint8.2-patch1 (including)8.2-patch1 (including)
IdentityiqSailpoint8.2-patch2 (including)8.2-patch2 (including)
IdentityiqSailpoint8.2-patch4 (including)8.2-patch4 (including)
IdentityiqSailpoint8.3 (including)8.3 (including)
IdentityiqSailpoint8.3-patch1 (including)8.3-patch1 (including)

Potential Mitigations

References