CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
93.1%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
total
This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227.
[
{
"cpes": [
"cpe:2.3:a:sailpoint:identityiq:*:*:*:*:*:*:*:*"
],
"vendor": "sailpoint",
"product": "identityiq",
"versions": [
{
"status": "affected",
"version": "8.1",
"lessThan": "8.1p7",
"versionType": "custom"
},
{
"status": "affected",
"version": "8.2",
"lessThan": "8.2p7",
"versionType": "custom"
},
{
"status": "affected",
"version": "8.3",
"lessThan": "8.3p4",
"versionType": "custom"
},
{
"status": "affected",
"version": "8.4",
"lessThan": "8.4p1",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
93.1%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
total