The Register: Perfect 10 directory traversal vuln hits SailPoint’s IAM solution

Source URL: https://www.theregister.com/2024/12/03/sailpoint_identityiq_vulnerability/
Source: The Register
Title: Perfect 10 directory traversal vuln hits SailPoint’s IAM solution

Feedly Summary: 20-year-old info disclosure class bug still pervades security software
It’s time to rev up those patch engines after SailPoint disclosed a perfect 10/10 severity vulnerability in its identity and access management (IAM) platform IdentityIQ.…

AI Summary and Description: Yes

Summary: The text discusses a critical vulnerability identified in SailPoint’s IdentityIQ IAM platform, classified as a directory traversal flaw, which has implications for information security and compliance within enterprises using the platform. The lack of a security advisory raises concerns about the risk management practices of the vendor.

Detailed Description:

– A severe vulnerability (CVE-2024-10905) has been identified in SailPoint’s IdentityIQ platform, which is an identity and access management tool.
– The vulnerability received a perfect score of 10/10 on the severity scale, indicating it poses a serious risk to users.
– This flaw falls under the Common Weakness Enumeration (CWE-66), specifically known as a directory traversal vulnerability. Such vulnerabilities have long been known for their exploitability and the potential to expose sensitive information.
– The Cybersecurity and Infrastructure Security Agency (CISA) has warned vendors about the need to eliminate these easy-to-exploit bugs, underscoring the importance of treating user-supplied input as potentially malicious.
– The lack of a security advisory accompanying this vulnerability has raised questions about the communication and risk management practices of SailPoint.
– CISA’s initiatives favor secure-by-design principles, encouraging software vendors to address fundamental security flaws to reduce overall cybersecurity risks.
– SailPoint’s IdentityIQ is used by several major organizations, including BNP Paribas, Toyota Europe, and The Home Depot, emphasizing the widespread impact this vulnerability could have.
– Users are advised to upgrade their software to specific patched versions to mitigate risks associated with the flaw.

Key Points:
– **Vulnerability type**: Directory traversal (CWE-66).
– **Severity**: 10/10, indicating critical risk.
– **Affected versions**: Upgrades to versions 8.4p2, 8.3p5, and 8.2p8 recommended.
– **Implications**: Potential access to unauthorized directories and sensitive information disclosure.
– **Agency Response**: CISA’s alert supports a campaign for adopting secure coding practices.
– **Customer Impact**: Major organizations using the platform need to prioritize patching to maintain compliance and security posture.

This incident highlights the importance of robust vulnerability management processes and the proactive communication of risks to maintain the security and compliance of IT infrastructures.