Security Advisory
ForgeRock Identity Platform
ForgeRock Identity Cloud

IDM Security Advisory #202208

Last updated Nov 4, 2022

A security vulnerability has been discovered in a dependency present in version 7.2.1 of Identity Management (IDM) as well as versions 1.5.20.8 and 1.5.20.9 of the CSV Connector. The vulnerability is not known to be exploitable in the context of IDM; however, you should still secure your deployments at the earliest opportunity as outlined in this security advisory.


Identity Cloud customers

The CSV connector is not included with ForgeRock Identity Cloud. However, if a customer is using the Java Remote Connector Server (RCS) in their environment, the CSV connector needs to be secured as recommended in this security advisory.

October 27, 2022

A security vulnerability has been discovered in one supported version of IDM as well as separate downloadable components. This vulnerability affects versions 1.5.20.8 and 1.5.20.9 of the CSV connector. 

  • Version 1.5.20.9 of the CSV connector is included in IDM 7.2.1, so that version is also impacted. 
  • Versions 1.5.20.8 and 1.5.20.9 of the Java Remote Connector Server (RCS) also include the vulnerable version of the CSV connector, and for that reason, are also impacted. 

The vulnerability is within a separate dependency of the CSV connector (Apache Commons Text version 1.9) CVE-2022-42889 which has a severity of 9.8. However, it is ForgeRock's belief that the vulnerability has no practical exploitation within IDM or via the RCS; this reduces the severity of the vulnerability considerably.

Customers who still wish to take immediate action can do so by upgrading to the latest version 1.5.20.11.

Note

Details about this vulnerability are deliberately kept to a minimum to protect your deployments and prevent someone trying to exploit them in the field. Please do not ask for steps to reproduce for the same reasons.

Issue #202208-01:

Affected versions IDM 7.2.1; CSV Connector 1.5.20.8 and 1.5.20.9; Java RCS 1.5.20.8 and 1.5.20.9
Fixed versions CSV Connector 1.5.20.11
Component Connector
Severity 9.8

Description:

The CSV Connector includes a vulnerable third-party library.

Workaround:

Downgrade the CSV Connector to version 1.5.20.2.

The high level steps to downgrade are:

  1. Download version 1.5.20.2 of the CSV connector version from Backstage.
  2. Delete the impacted CSV connector jar from either the IDM 7.2.1 /connectors directory or the RCS /connectors directory, and replace it with the csvfile-connector-1.5.20.2.jar
  3. Adjust your provisioner configuration accordingly; the bundleVersion must reference the updated connector version. 

If you are using the RCS, see How do I upgrade the Java Remote Connector Server (RCS) for Identity Cloud and IDM? for further information on updating your connector. 

Resolution:

Upgrade the CSV Connector to version 1.5.20.11.

The high level steps to upgrade are:

  1. Download version 1.5.20.11 of the CSV connector version from Backstage.
  2. Delete the impacted CSV connector jar from either the IDM 7.2.1 /connectors directory or the RCS /connectors directory, and replace it with the csvfile-connector-1.5.20.11.jar
  3. Adjust your provisioner configuration accordingly; the bundleVersion must reference the updated connector version. 

If you are using the RCS, see How do I upgrade the Java Remote Connector Server (RCS) for Identity Cloud and IDM? for instructions on upgrading the connector. 

See Also

CVE-2022-42889

Change Log

The following table tracks changes to the security advisory:

Date  Description
November 4, 2022 Updated article to include the just released fixed version of the CSV connector 1.5.20.11 and added the CVE reference for the Apache vulnerability.
October 27, 2022 Initial release

Copyright and Trademarks Copyright © 2022 ForgeRock, all rights reserved.