Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2023-32217 | First vendor Publication | 2023-06-05 |
Vendor | Cve | Last vendor Modification | 2023-06-12 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.8 | ||
Base Score | 8.8 | Environmental Score | 8.8 |
impact SubScore | 5.9 | Temporal Score | 8.8 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p3, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p6, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6Â allow an authenticated user to invoke a Java constructor with no arguments or a Java constructor with a single Map argument in any Java class available in the IdentityIQ application classpath. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32217 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-470 | Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|---|
MISC | https://www.sailpoint.com/security-advisories/sailpoint-identityiq-unsafe-use... |
Alert History
Date | Informations |
---|---|
2023-06-13 00:27:21 |
|
2023-06-06 02:18:04 |
|
2023-06-06 02:17:59 |
|
2023-06-05 17:27:14 |
|
2023-06-05 09:27:21 |
|