CVE-2021-35464

ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:forgerock:am:*:*:*:*:*:*:*:*
cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*

History

02 Aug 2021, 18:03

Type Values Removed Values Added
CWE CWE-502
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8
CPE cpe:2.3:a:forgerock:am:*:*:*:*:*:*:*:*
cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*
References (MISC) https://bugster.forgerock.org - (MISC) https://bugster.forgerock.org - Broken Link
References (MISC) http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html - (MISC) http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html - Exploit, Third Party Advisory, VDB Entry
References (CONFIRM) https://backstage.forgerock.com/knowledge/kb/article/a47894244 - (CONFIRM) https://backstage.forgerock.com/knowledge/kb/article/a47894244 - Exploit, Vendor Advisory

02 Aug 2021, 17:15

Type Values Removed Values Added
Summary ForgeRock AM server 6.x before 7, and OpenAM 14.6.3, has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/Version request to the server. The vulnerability exists due to incorrect usage of Sun ONE Application Framework (JATO). ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
References
  • (CONFIRM) https://backstage.forgerock.com/knowledge/kb/article/a47894244 -

22 Jul 2021, 18:43

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-22 18:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-35464

Mitre link : CVE-2021-35464

CVE.ORG link : CVE-2021-35464


JSON object : View

Products Affected

forgerock

  • openam
  • am
CWE
CWE-502

Deserialization of Untrusted Data