CVE-2024-10905

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to access sensitive static content within IdentityIQ application directories via HTTP/HTTPS. It affects IdentityIQ versions 8.4 (prior to 8.4p2), 8.3 (prior to 8.3p5), 8.2 (prior to 8.2p8), and all earlier versions. The improper access control exposes files that should be protected.

💻 Affected Systems

Products:
  • SailPoint IdentityIQ
Versions: All versions prior to 8.2p8, 8.3p5, and 8.4p2
Operating Systems: All supported OS platforms for IdentityIQ
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive configuration files, credentials, or proprietary data leading to complete system compromise and data exfiltration.

🟠

Likely Case

Unauthorized access to application files containing sensitive information like configuration details, logs, or temporary files.

🟢

If Mitigated

Limited exposure of non-critical static files with no sensitive data accessible.

🌐 Internet-Facing: HIGH - Direct HTTP/HTTPS access means internet-facing instances are immediately vulnerable to scanning and exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this to access sensitive application files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP/HTTPS access to the IdentityIQ application; no authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IdentityIQ 8.2p8, 8.3p5, or 8.4p2

Vendor Advisory: https://www.sailpoint.com/security-advisories/identityiq-improper-access-control-vulnerability-cve-2024-10905

Restart Required: Yes

Instructions:

1. Download the appropriate patch from SailPoint support portal. 2. Apply patch according to SailPoint documentation. 3. Restart IdentityIQ services. 4. Verify access controls are properly enforced.

🔧 Temporary Workarounds

Web Server Access Control

all

Configure web server (Tomcat) to restrict access to static content directories

Modify Tomcat web.xml to add security constraints for /identityiq/* paths

Network Segmentation

all

Restrict network access to IdentityIQ HTTP/HTTPS ports

Configure firewall rules to limit access to IdentityIQ ports (8080, 8443) to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit HTTP/HTTPS access to IdentityIQ
  • Monitor access logs for unauthorized attempts to access static content directories

🔍 How to Verify

Check if Vulnerable:

Attempt to access static content via HTTP/HTTPS (e.g., http://[identityiq-server]/identityiq/static/) and check if files are accessible without authentication.

Check Version:

Check IdentityIQ version via admin console or review installation logs

Verify Fix Applied:

After patching, attempt the same access and verify files are no longer accessible without proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to static content requests without authentication
  • Unusual access patterns to /identityiq/static/ paths

Network Indicators:

  • HTTP GET requests to static content directories from unauthorized sources

SIEM Query:

source="identityiq" AND (uri_path="/identityiq/static/*" OR uri_path="/identityiq/*.jsp") AND http_status=200 AND NOT user_agent="internal-monitoring"

🔗 References

📤 Share & Export