Skip to content

Tenant Separation Bypass via Mantis Message Server API

Moderate
mbhatt1 published GHSA-qqcp-xr8r-vqfw May 15, 2024

Package

SailPoint IdentityNow (N/A)

Affected versions

N/A

Patched versions

N/A

Description

Impact

An authenticated user can issue a message server API request that exploits an access control issue, allowing them to bypass tenant isolation controls and exfiltrate job processing metadata belonging to other tenants.

Vulnerability Description

An improper access control was identified in the Identity Cloud Security (ISC) message server API that allowed an authenticated user to exfiltrate job processing metadata belonging to other tenants.

Identification and Remediation

This issue was identified during a cloud vendor Red Team X assessment which was conducted on a dedicated bug bounty environment and is disclosed in CVE-2024-3317. This issue has since been resolved. No further action is needed.

Severity

Moderate
5.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

CVE ID

CVE-2024-3317

Weaknesses

Credits