ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://backstage.forgerock.com/knowledge/kb/article/a47894244 | Exploit Vendor Advisory |
https://bugster.forgerock.org | Broken Link |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-07-22T17:10:18
Updated: 2021-08-02T17:00:26
Reserved: 2021-06-23T00:00:00
Link: CVE-2021-35464
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-07-22T18:15:23.247
Modified: 2021-08-02T18:03:13.923
Link: CVE-2021-35464
JSON object: View
Redhat Information
No data.
CWE