{ "id": "CVE-2024-2227", "sourceIdentifier": "psirt@sailpoint.com", "published": "2024-03-22T16:15:09.253", "lastModified": "2024-03-22T19:02:10.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability allows access to arbitrary files in the application server file system due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950. The remediation for this vulnerability contained in this security fix provides additional changes to the remediation announced in May 2021 tracked by ETN IIQSAW-3585 and January 2024 tracked by IIQFW-336. This vulnerability in IdentityIQ is assigned CVE-2024-2227." }, { "lang": "es", "value": "Esta vulnerabilidad permite el acceso a archivos arbitrarios en el sistema de archivos del servidor de aplicaciones debido a una vulnerabilidad de path traversal en JavaServer Faces (JSF) 2.2.20 documentada en CVE-2020-6950. La soluci\u00f3n para esta vulnerabilidad contenida en esta soluci\u00f3n de seguridad proporciona cambios adicionales a la soluci\u00f3n anunciada en mayo de 2021 rastreada por ETN IIQSAW-3585 y en enero de 2024 rastreada por IIQFW-336. Esta vulnerabilidad en IdentityIQ tiene asignada CVE-2024-2227." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@sailpoint.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 6.0 } ] }, "weaknesses": [ { "source": "psirt@sailpoint.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "references": [ { "url": "https://www.sailpoint.com/security-advisories/", "source": "psirt@sailpoint.com" } ] }