In OpenIDM through 4.0.0 before 4.5.0, the info endpoint may leak sensitive information upon a request by the "anonymous" user, as demonstrated by responses with a 200 HTTP status code and a JSON object containing IP address strings. This is related to a missing access-control check in bin/defaults/script/info/login.js.
References
Link | Resource |
---|---|
http://www.rootlabs.com.br/information-disclosure-forgerock-openidm-4-0-0-and-4-5-0/ | Exploit Third Party Advisory |
https://backstage.forgerock.com/knowledge/kb/article/a92936505 | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-04-09 01:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-7589
Mitre link : CVE-2017-7589
CVE.ORG link : CVE-2017-7589
JSON object : View
Products Affected
openidm_project
- openidm
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor