Vulnerabilites related to forgerock - access_management
CVE-2024-25566 (GCVE-0-2024-25566)
Vulnerability from cvelistv5
Published
2024-10-29 15:34
Modified
2024-10-29 19:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Summary
An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Ping Identity | PingAM |
Version: 7.5.0 Version: 7.4.0 Version: 7.3.0 Version: 7.2.0 Version: 7.1.0 Version: 0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25566", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-29T19:58:14.725482Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-29T19:58:25.775Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "PingAM", "vendor": "Ping Identity", "versions": [ { "status": "affected", "version": "7.5.0", "versionType": "major release" }, { "lessThanOrEqual": "7.4.1", "status": "affected", "version": "7.4.0", "versionType": "maintenance release" }, { "lessThanOrEqual": "7.3.1", "status": "affected", "version": "7.3.0", "versionType": "maintenance release" }, { "lessThanOrEqual": "7.2.2", "status": "affected", "version": "7.2.0", "versionType": "maintenance release" }, { "lessThanOrEqual": "7.1.4", "status": "affected", "version": "7.1.0", "versionType": "maintenance release" }, { "lessThanOrEqual": "7.0.2", "status": "affected", "version": "0", "versionType": "maintenance release" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks\u003cbr\u003e\u003cbr\u003e" } ], "value": "An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks" } ], "impacts": [ { "capecId": "CAPEC-98", "descriptions": [ { "lang": "en", "value": "CAPEC-98 Phishing" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-29T15:34:53.358Z", "orgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e", "shortName": "Ping Identity" }, "references": [ { "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "url": "https://backstage.forgerock.com/knowledge/advisories/article/a63463303" } ], "source": { "discovery": "EXTERNAL" }, "title": "Open Redirect in PingAM", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "5998a2e9-ae88-42cd-b6e0-7564fd979f9e", "assignerShortName": "Ping Identity", "cveId": "CVE-2024-25566", "datePublished": "2024-10-29T15:34:53.358Z", "dateReserved": "2024-02-29T23:52:30.493Z", "dateUpdated": "2024-10-29T19:58:25.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37154 (GCVE-0-2021-37154)
Vulnerability from cvelistv5
Published
2021-08-25 20:02
Modified
2024-08-04 01:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion.
References
▼ | URL | Tags |
---|---|---|
https://www.forgerock.com/platform/access-management | x_refsource_MISC | |
https://backstage.forgerock.com/knowledge/kb/article/a55763454 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.forgerock.com/platform/access-management" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T20:02:53", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.forgerock.com/platform/access-management" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-37154", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.forgerock.com/platform/access-management", "refsource": "MISC", "url": "https://www.forgerock.com/platform/access-management" }, { "name": "https://backstage.forgerock.com/knowledge/kb/article/a55763454", "refsource": "CONFIRM", "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-37154", "datePublished": "2021-08-25T20:02:53", "dateReserved": "2021-07-21T00:00:00", "dateUpdated": "2024-08-04T01:16:03.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-3748 (GCVE-0-2022-3748)
Vulnerability from cvelistv5
Published
2023-04-14 14:06
Modified
2025-04-14 17:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-285 - Improper Authorization
Summary
Improper Authorization vulnerability in ForgeRock Inc. Access Management allows Authentication Bypass. This issue affects Access Management: from 6.5.0 through 7.2.0.
References
▼ | URL | Tags |
---|---|---|
https://backstage.forgerock.com/knowledge/kb/article/a92134872 | vendor-advisory | |
https://backstage.forgerock.com/knowledge/kb/article/a34332318 | vendor-advisory | |
https://backstage.forgerock.com/downloads/browse/am/all/productId:am | product |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ForgeRock Inc. | Access Management |
Version: 6.5.0 ≤ 7.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:20:57.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a92134872" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a34332318" }, { "tags": [ "product", "x_transferred" ], "url": "https://backstage.forgerock.com/downloads/browse/am/all/productId:am" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3748", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T19:32:08.402131Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-06T19:32:17.712Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Access Management", "vendor": "ForgeRock Inc.", "versions": [ { "lessThanOrEqual": "7.2.0", "status": "affected", "version": "6.5.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Authorization vulnerability in ForgeRock Inc. Access Management allows Authentication Bypass.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eThis issue affects Access Management: from 6.5.0 through 7.2.0.\u003c/span\u003e" } ], "value": "Improper Authorization vulnerability in ForgeRock Inc. Access Management allows Authentication Bypass.\u00a0This issue affects Access Management: from 6.5.0 through 7.2.0." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-14T17:03:55.384Z", "orgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "shortName": "ForgeRock" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a92134872" }, { "tags": [ "vendor-advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a34332318" }, { "tags": [ "product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/all/productId:am" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper authorization that can lead to account impersonation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "assignerShortName": "ForgeRock", "cveId": "CVE-2022-3748", "datePublished": "2023-04-14T14:06:30.571Z", "dateReserved": "2022-10-28T15:07:25.617Z", "dateUpdated": "2025-04-14T17:03:55.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24670 (GCVE-0-2022-24670)
Vulnerability from cvelistv5
Published
2022-10-27 16:53
Modified
2025-05-09 19:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Information Exposure
Summary
An attacker can use the unrestricted LDAP queries to determine configuration entries
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ForgeRock | Access Management |
Version: unspecified < 6.5.5 Version: unspecified < 7.1.2 Version: unspecified < 7.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:49.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a90639318" }, { "tags": [ "x_transferred" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-24670", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-09T19:17:08.264419Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-09T19:17:19.956Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Access Management", "vendor": "ForgeRock", "versions": [ { "lessThan": "6.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-10-20T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "An attacker can use the unrestricted LDAP queries to determine configuration entries" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-14T17:03:49.289Z", "orgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "shortName": "ForgeRock" }, "references": [ { "url": "https://backstage.forgerock.com/knowledge/kb/article/a90639318" }, { "url": "https://backstage.forgerock.com/downloads/browse/am/featured" } ], "solutions": [ { "lang": "en", "value": "Upgrade to the latest versions." } ], "source": { "advisory": "202204", "defect": [ "https://bugster.forgerock.org/jira/browse/OPENAM-18368", "(not", "public)" ], "discovery": "EXTERNAL" }, "title": "Any user can run unrestricted LDAP queries against a configuration endpoint", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "assignerShortName": "ForgeRock", "cveId": "CVE-2022-24670", "datePublished": "2022-10-27T16:53:00.019Z", "dateReserved": "2022-02-08T00:00:00.000Z", "dateUpdated": "2025-05-09T19:17:19.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-37153 (GCVE-0-2021-37153)
Vulnerability from cvelistv5
Published
2021-08-25 20:05
Modified
2024-08-04 01:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ForgeRock Access Management (AM) before 7.0.2, when configured with Active Directory as the Identity Store, has an authentication-bypass issue.
References
▼ | URL | Tags |
---|---|---|
https://www.forgerock.com/platform/access-management | x_refsource_MISC | |
https://backstage.forgerock.com/knowledge/kb/article/a55763454 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.forgerock.com/platform/access-management" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ForgeRock Access Management (AM) before 7.0.2, when configured with Active Directory as the Identity Store, has an authentication-bypass issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T20:05:54", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.forgerock.com/platform/access-management" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-37153", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ForgeRock Access Management (AM) before 7.0.2, when configured with Active Directory as the Identity Store, has an authentication-bypass issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.forgerock.com/platform/access-management", "refsource": "MISC", "url": "https://www.forgerock.com/platform/access-management" }, { "name": "https://backstage.forgerock.com/knowledge/kb/article/a55763454", "refsource": "CONFIRM", "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-37153", "datePublished": "2021-08-25T20:05:54", "dateReserved": "2021-07-21T00:00:00", "dateUpdated": "2024-08-04T01:16:03.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-0582 (GCVE-0-2023-0582)
Vulnerability from cvelistv5
Published
2024-03-27 17:09
Modified
2025-04-14 17:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ForgeRock Access Management allows Authorization Bypass.
This issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2.
References
▼ | URL | Tags |
---|---|---|
https://backstage.forgerock.com/downloads/browse/am/featured | product | |
https://backstage.forgerock.com/knowledge/kb/article/a64088600 | mitigation, release-notes, vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
forgerock | access management |
Version: 0 Version: 0 Version: 0 Version: 0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:forgerock:access_management:7.3.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "access_management", "vendor": "forgerock", "versions": [ { "status": "unaffected", "version": "7.3.0" } ] }, { "cpes": [ "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "access_management", "vendor": "forgerock", "versions": [ { "lessThan": "7.2.1", "status": "affected", "version": "7.2.0", "versionType": "custom" }, { "lessThan": "7.1.4", "status": "affected", "version": "7.1.3", "versionType": "custom" }, { "lessThanOrEqual": "7.0.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-0582", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T17:45:50.848530Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T17:56:59.766Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.097Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "product", "x_transferred" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "tags": [ "mitigation", "release-notes", "vendor-advisory", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "access management", "vendor": "forgerock", "versions": [ { "lessThan": "7.3.0", "status": "affected", "version": "0", "versionType": "major release" }, { "lessThan": "7.2.1", "status": "affected", "version": "0", "versionType": "maintenance release" }, { "lessThan": "7.1.4", "status": "affected", "version": "0", "versionType": "maintenance release" }, { "lessThanOrEqual": "7.0.2", "status": "affected", "version": "0", "versionType": "maintenance release" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ForgeRock Access Management allows Authorization Bypass.\u003cp\u003e\u003c/p\u003e\u003cp\u003eThis issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2.\u003c/p\u003e" } ], "value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ForgeRock Access Management allows Authorization Bypass.\n\nThis issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2." } ], "impacts": [ { "capecId": "CAPEC-126", "descriptions": [ { "lang": "en", "value": "CAPEC-126 Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-14T17:03:58.780Z", "orgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "shortName": "ForgeRock" }, "references": [ { "tags": [ "product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "tags": [ "mitigation", "release-notes", "vendor-advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600" } ], "source": { "discovery": "UNKNOWN" }, "title": "Path Traversal in ForgeRock Access Managment", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "assignerShortName": "ForgeRock", "cveId": "CVE-2023-0582", "datePublished": "2024-03-27T17:09:43.769Z", "dateReserved": "2023-01-30T14:29:20.746Z", "dateUpdated": "2025-04-14T17:03:58.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-7272 (GCVE-0-2018-7272)
Vulnerability from cvelistv5
Published
2018-02-21 00:00
Modified
2024-09-17 03:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The REST APIs in ForgeRock AM before 5.5.0 include SSOToken IDs as part of the URL, which allows attackers to obtain sensitive information by finding an ID value in a log file.
References
▼ | URL | Tags |
---|---|---|
https://backstage.forgerock.com/knowledge/kb/book/b21824339 | x_refsource_MISC | |
https://hansesecure.de/vulnerability-in-am/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:24:11.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/book/b21824339" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://hansesecure.de/vulnerability-in-am/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The REST APIs in ForgeRock AM before 5.5.0 include SSOToken IDs as part of the URL, which allows attackers to obtain sensitive information by finding an ID value in a log file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-21T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://backstage.forgerock.com/knowledge/kb/book/b21824339" }, { "tags": [ "x_refsource_MISC" ], "url": "https://hansesecure.de/vulnerability-in-am/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The REST APIs in ForgeRock AM before 5.5.0 include SSOToken IDs as part of the URL, which allows attackers to obtain sensitive information by finding an ID value in a log file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://backstage.forgerock.com/knowledge/kb/book/b21824339", "refsource": "MISC", "url": "https://backstage.forgerock.com/knowledge/kb/book/b21824339" }, { "name": "https://hansesecure.de/vulnerability-in-am/", "refsource": "MISC", "url": "https://hansesecure.de/vulnerability-in-am/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7272", "datePublished": "2018-02-21T00:00:00Z", "dateReserved": "2018-02-20T00:00:00Z", "dateUpdated": "2024-09-17T03:03:02.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-35464 (GCVE-0-2021-35464)
Vulnerability from cvelistv5
Published
2021-07-22 17:10
Modified
2025-07-30 01:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
References
▼ | URL | Tags |
---|---|---|
https://bugster.forgerock.org | x_refsource_MISC | |
http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html | x_refsource_MISC | |
https://backstage.forgerock.com/knowledge/kb/article/a47894244 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:40:45.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugster.forgerock.org" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a47894244" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-35464", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T19:41:03.395101Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-35464" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:38:05.868Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2021-11-03T00:00:00+00:00", "value": "CVE-2021-35464 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:00:26.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugster.forgerock.org" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a47894244" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35464", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugster.forgerock.org", "refsource": "MISC", "url": "https://bugster.forgerock.org" }, { "name": "http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html" }, { "name": "http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html" }, { "name": "https://backstage.forgerock.com/knowledge/kb/article/a47894244", "refsource": "CONFIRM", "url": "https://backstage.forgerock.com/knowledge/kb/article/a47894244" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35464", "datePublished": "2021-07-22T17:10:18.000Z", "dateReserved": "2021-06-23T00:00:00.000Z", "dateUpdated": "2025-07-30T01:38:05.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24669 (GCVE-0-2022-24669)
Vulnerability from cvelistv5
Published
2022-10-27 16:53
Modified
2025-05-06 18:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ForgeRock | Access Management |
Version: unspecified < 6.5.5 Version: unspecified < 7.1.2 Version: unspecified < 7.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:49.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a90639318" }, { "tags": [ "x_transferred" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-24669", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T18:33:01.889737Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T18:33:31.107Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Access Management", "vendor": "ForgeRock", "versions": [ { "lessThan": "6.5.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "7.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-10-20T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-14T17:03:57.090Z", "orgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "shortName": "ForgeRock" }, "references": [ { "url": "https://backstage.forgerock.com/knowledge/kb/article/a90639318" }, { "url": "https://backstage.forgerock.com/downloads/browse/am/featured" } ], "solutions": [ { "lang": "en", "value": "Upgrade to the latest versions." } ], "source": { "advisory": "202204", "defect": [ "https://bugster.forgerock.org/jira/browse/OPENAM-18367", "(not", "public)" ], "discovery": "EXTERNAL" }, "title": "Anonymous users can register / de-register for configuration change notifications", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "assignerShortName": "ForgeRock", "cveId": "CVE-2022-24669", "datePublished": "2022-10-27T16:53:56.378Z", "dateReserved": "2022-02-08T00:00:00.000Z", "dateUpdated": "2025-05-06T18:33:31.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-14395 (GCVE-0-2017-14395)
Vulnerability from cvelistv5
Published
2019-06-19 21:22
Modified
2024-08-05 19:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user's browser via reflected XSS.
References
▼ | URL | Tags |
---|---|---|
https://backstage.forgerock.com/knowledge/kb/article/a45958025 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:27:40.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-06-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user\u0027s browser via reflected XSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-19T21:22:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14395", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user\u0027s browser via reflected XSS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://backstage.forgerock.com/knowledge/kb/article/a45958025", "refsource": "MISC", "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-14395", "datePublished": "2019-06-19T21:22:29", "dateReserved": "2017-09-12T00:00:00", "dateUpdated": "2024-08-05T19:27:40.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-4201 (GCVE-0-2021-4201)
Vulnerability from cvelistv5
Published
2022-02-14 21:04
Modified
2025-04-14 17:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
Missing access control in ForgeRock Access Management 7.1.0 and earlier versions on all platforms allows remote unauthenticated attackers to hijack sessions, including potentially admin-level sessions. This issue affects: ForgeRock Access Management 7.1 versions prior to 7.1.1; 6.5 versions prior to 6.5.4; all previous versions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ForgeRock | Access Management |
Version: 7.1 < 7.1.1 Version: 6.5 < 6.5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:16:04.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a50037155#x7ZPA0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Access Management", "vendor": "ForgeRock", "versions": [ { "lessThan": "7.1.1", "status": "affected", "version": "7.1", "versionType": "custom" }, { "lessThan": "6.5.4", "status": "affected", "version": "6.5", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Escourbiac Maxime and Schmitt Maxence from Mitchelin CERT" } ], "datePublic": "2021-12-07T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Missing access control in ForgeRock Access Management 7.1.0 and earlier versions on all platforms allows remote unauthenticated attackers to hijack sessions, including potentially admin-level sessions. This issue affects: ForgeRock Access Management 7.1 versions prior to 7.1.1; 6.5 versions prior to 6.5.4; all previous versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-14T17:03:52.274Z", "orgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "shortName": "ForgeRock" }, "references": [ { "url": "https://backstage.forgerock.com/knowledge/kb/article/a50037155#x7ZPA0" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in AM 6.5.4, 7.1.1, and all later versions." } ], "source": { "advisory": "202110-01", "discovery": "EXTERNAL" }, "title": "Pre-authentication session hijacking", "workarounds": [ { "lang": "en", "value": "Block access to the following endpoints:\n/authservice\n/sessionservice\n/profileservice\n/policyservice\n/namingservice\n/loggingservice" } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@forgerock.com", "DATE_PUBLIC": "2021-12-07T12:00:00.000Z", "ID": "CVE-2021-4201", "STATE": "PUBLIC", "TITLE": "Pre-authentication session hijacking" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Access Management", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.1", "version_value": "7.1.1" }, { "version_affected": "\u003c", "version_name": "6.5", "version_value": "6.5.4" } ] } } ] }, "vendor_name": "ForgeRock" } ] } }, "credit": [ { "lang": "eng", "value": "Escourbiac Maxime and Schmitt Maxence from Mitchelin CERT" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing access control in ForgeRock Access Management 7.1.0 and earlier versions on all platforms allows remote unauthenticated attackers to hijack sessions, including potentially admin-level sessions. This issue affects: ForgeRock Access Management 7.1 versions prior to 7.1.1; 6.5 versions prior to 6.5.4; all previous versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://backstage.forgerock.com/knowledge/kb/article/a50037155#x7ZPA0", "refsource": "CONFIRM", "url": "https://backstage.forgerock.com/knowledge/kb/article/a50037155#x7ZPA0" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in AM 6.5.4, 7.1.1, and all later versions." } ], "source": { "advisory": "202110-01", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "Block access to the following endpoints:\n/authservice\n/sessionservice\n/profileservice\n/policyservice\n/namingservice\n/loggingservice" } ] } } }, "cveMetadata": { "assignerOrgId": "6b18ae97-0aab-4af2-9ba4-74b2b139ddfa", "assignerShortName": "ForgeRock", "cveId": "CVE-2021-4201", "datePublished": "2022-02-14T21:04:29.132Z", "dateReserved": "2022-01-06T00:00:00.000Z", "dateUpdated": "2025-04-14T17:03:52.274Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-14394 (GCVE-0-2017-14394)
Vulnerability from cvelistv5
Published
2019-06-19 21:22
Modified
2024-08-05 19:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect.
References
▼ | URL | Tags |
---|---|---|
https://backstage.forgerock.com/knowledge/kb/article/a45958025 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:27:40.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-06-04T00:00:00", "descriptions": [ { "lang": "en", "value": "OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-19T21:22:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://backstage.forgerock.com/knowledge/kb/article/a45958025", "refsource": "MISC", "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-14394", "datePublished": "2019-06-19T21:22:20", "dateReserved": "2017-09-12T00:00:00", "dateUpdated": "2024-08-05T19:27:40.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-07-22 18:15
Modified
2025-03-14 16:45
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * | |
forgerock | openam | * |
{ "cisaActionDue": "2021-11-17", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "ForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "93CE7640-AC5C-40EB-A613-D68B2B21230B", "versionEndExcluding": "6.5.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6A8D81B-9638-46CA-8F51-6E3BA7CBC74B", "versionEndExcluding": "14.6.3", "versionStartIncluding": "9.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier" }, { "lang": "es", "value": "El servidor ForgeRock AM anterior a la versi\u00f3n 7.0 tiene una vulnerabilidad de deserializaci\u00f3n de Java en el par\u00e1metro jato.pageSession en varias p\u00e1ginas. La explotaci\u00f3n no requiere autenticaci\u00f3n, y la ejecuci\u00f3n remota de c\u00f3digo se puede desencadenar mediante el env\u00edo de una \u00fanica solicitud /ccversion/* manipulada al servidor. La vulnerabilidad existe debido al uso de Sun ONE Application Framework (JATO) que se encuentra en las versiones de Java 8 o anteriores" } ], "id": "CVE-2021-35464", "lastModified": "2025-03-14T16:45:41.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2021-07-22T18:15:23.247", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a47894244" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://bugster.forgerock.org" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a47894244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://bugster.forgerock.org" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-27 17:15
Modified
2024-11-21 06:50
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
An attacker can use the unrestricted LDAP queries to determine configuration entries
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * | |
forgerock | access_management | * | |
forgerock | access_management | * | |
forgerock | access_management | * | |
forgerock | access_management | 6.5.1 | |
forgerock | access_management | 6.5.3 | |
forgerock | access_management | 6.5.4 | |
forgerock | access_management | 7.1.0 | |
forgerock | access_management | 7.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "4162CDDD-B604-4B3C-AAA1-14D33FE1EF45", "versionEndIncluding": "6.0.0.7", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D9D6502-4993-46CE-9FDC-71808D76C416", "versionEndIncluding": "6.5.0.2", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9AC242A-391E-463D-8C00-28CE22D6339E", "versionEndIncluding": "6.5.2.3", "versionStartIncluding": "6.5.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "D66C82CB-63C8-4A3C-AD19-08CD666F8C9D", "versionEndIncluding": "7.0.2", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E31AD7C7-9145-4EBC-A1A1-531B77BEFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F3D7F2DE-8E77-4268-9F8B-D95954A31140", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "F4CB42E3-B330-4202-87A4-EC503D569C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9725E909-8707-402E-939B-EC6FA6FA0984", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C5AEAE88-FA4F-4970-A5AB-A1FDBC2A447A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker can use the unrestricted LDAP queries to determine configuration entries" }, { "lang": "es", "value": "Un atacante puede utilizar las consultas LDAP sin restricciones para determinar las entradas de configuraci\u00f3n." } ], "id": "CVE-2022-24670", "lastModified": "2024-11-21T06:50:49.940", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "psirt@forgerock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-27T17:15:09.813", "references": [ { "source": "psirt@forgerock.com", "tags": [ "Product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "source": "psirt@forgerock.com", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a90639318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a90639318" } ], "sourceIdentifier": "psirt@forgerock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@forgerock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-27 17:15
Modified
2024-11-21 06:50
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * | |
forgerock | access_management | * | |
forgerock | access_management | * | |
forgerock | access_management | * | |
forgerock | access_management | 6.5.1 | |
forgerock | access_management | 6.5.3 | |
forgerock | access_management | 6.5.4 | |
forgerock | access_management | 7.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "4162CDDD-B604-4B3C-AAA1-14D33FE1EF45", "versionEndIncluding": "6.0.0.7", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D9D6502-4993-46CE-9FDC-71808D76C416", "versionEndIncluding": "6.5.0.2", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9AC242A-391E-463D-8C00-28CE22D6339E", "versionEndIncluding": "6.5.2.3", "versionStartIncluding": "6.5.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "D66C82CB-63C8-4A3C-AD19-08CD666F8C9D", "versionEndIncluding": "7.0.2", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E31AD7C7-9145-4EBC-A1A1-531B77BEFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F3D7F2DE-8E77-4268-9F8B-D95954A31140", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "F4CB42E3-B330-4202-87A4-EC503D569C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9725E909-8707-402E-939B-EC6FA6FA0984", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services." }, { "lang": "es", "value": "Quiz\u00e1s sea posible obtener algunos detalles del despliegue mediante un ataque bien elaborado. Esto puede permitir que esos datos se utilicen para sondear los servicios de la red interna." } ], "id": "CVE-2022-24669", "lastModified": "2024-11-21T06:50:49.810", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "psirt@forgerock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-27T17:15:09.683", "references": [ { "source": "psirt@forgerock.com", "tags": [ "Product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "source": "psirt@forgerock.com", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a90639318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a90639318" } ], "sourceIdentifier": "psirt@forgerock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "psirt@forgerock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-25 21:15
Modified
2024-11-21 06:14
Severity ?
Summary
ForgeRock Access Management (AM) before 7.0.2, when configured with Active Directory as the Identity Store, has an authentication-bypass issue.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://backstage.forgerock.com/knowledge/kb/article/a55763454 | Vendor Advisory | |
cve@mitre.org | https://www.forgerock.com/platform/access-management | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://backstage.forgerock.com/knowledge/kb/article/a55763454 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.forgerock.com/platform/access-management | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "129A5709-ECFD-48AC-9F15-545ABB53224E", "versionEndExcluding": "7.0.2", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ForgeRock Access Management (AM) before 7.0.2, when configured with Active Directory as the Identity Store, has an authentication-bypass issue." }, { "lang": "es", "value": "ForgeRock Access Management (AM) versiones anteriores a 7.0.2, cuando est\u00e1 configurado con Active Directory como Almac\u00e9n de Identidades, presenta un problema de omisi\u00f3n de autenticaci\u00f3n." } ], "id": "CVE-2021-37153", "lastModified": "2024-11-21T06:14:44.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-25T21:15:06.990", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.forgerock.com/platform/access-management" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.forgerock.com/platform/access-management" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-19 22:15
Modified
2024-11-21 03:12
Severity ?
Summary
Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user's browser via reflected XSS.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * | |
forgerock | openam | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "31F2A6D9-D3BB-4D1D-BA49-D120B32EF6D7", "versionEndIncluding": "5.1.1", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*", "matchCriteriaId": "C991BD33-4EE1-4CD4-80EF-4F539F27E159", "versionEndIncluding": "13.5.1", "versionStartIncluding": "13.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user\u0027s browser via reflected XSS." }, { "lang": "es", "value": "El servidor de autorizaci\u00f3n Auth versi\u00f3n 2.0 de ForgeRock Access Management (OpenAM) versi\u00f3n 13.5.0-13.5.1 y Access Management (AM) versi\u00f3n 5.0.0-5.1.1, no comprueba correctamente redirect_uri para algunas peticiones no v\u00e1lidas, lo que permite a los atacantes ejecutar un script en el navegador del usuario por medio de un XSS reflejado." } ], "id": "CVE-2017-14395", "lastModified": "2024-11-21T03:12:41.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-19T22:15:13.673", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-27 18:15
Modified
2025-04-14 17:15
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ForgeRock Access Management allows Authorization Bypass.
This issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * | |
forgerock | access_management | 7.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "478F1C63-04C4-4408-89B2-9BB8DCDEC3A7", "versionEndExcluding": "7.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C87A61CB-EA7F-4898-AA4A-4E4A911D6942", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ForgeRock Access Management allows Authorization Bypass.\n\nThis issue affects access management: before 7.3.0, before 7.2.1, before 7.1.4, through 7.0.2." }, { "lang": "es", "value": "La limitaci\u00f3n inadecuada de una vulnerabilidad de nombre de ruta a un directorio restringido (\"Path Traversal\") en ForgeRock Access Management permite eludir la autorizaci\u00f3n. Este problema afecta la gesti\u00f3n de acceso: antes de 7.3.0, antes de 7.2.1, antes de 7.1.4, hasta 7.0.2." } ], "id": "CVE-2023-0582", "lastModified": "2025-04-14T17:15:26.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "psirt@forgerock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-27T18:15:08.237", "references": [ { "source": "psirt@forgerock.com", "tags": [ "Product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "source": "psirt@forgerock.com", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600" } ], "sourceIdentifier": "psirt@forgerock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "psirt@forgerock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-19 22:15
Modified
2024-11-21 03:12
Severity ?
Summary
OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * | |
forgerock | openam | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "31F2A6D9-D3BB-4D1D-BA49-D120B32EF6D7", "versionEndIncluding": "5.1.1", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*", "matchCriteriaId": "C991BD33-4EE1-4CD4-80EF-4F539F27E159", "versionEndIncluding": "13.5.1", "versionStartIncluding": "13.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect." }, { "lang": "es", "value": "El servidor de autorizaci\u00f3n OAuth versi\u00f3n 2.0 de ForgeRock Access Management (OpenAM) versi\u00f3n 13.5.0-13.5.1 y Access Management (AM) versi\u00f3n 5.0.0-5.1.1, no comprueba correctamente redirect_uri para algunas peticiones no v\u00e1lidas, lo que permite a los atacantes realizar phishing por medio de un redireccionamiento no validado." } ], "id": "CVE-2017-14394", "lastModified": "2024-11-21T03:12:41.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-19T22:15:13.593", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a45958025" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-14 22:15
Modified
2024-11-21 06:37
Severity ?
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Missing access control in ForgeRock Access Management 7.1.0 and earlier versions on all platforms allows remote unauthenticated attackers to hijack sessions, including potentially admin-level sessions. This issue affects: ForgeRock Access Management 7.1 versions prior to 7.1.1; 6.5 versions prior to 6.5.4; all previous versions.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@forgerock.com | https://backstage.forgerock.com/knowledge/kb/article/a50037155#x7ZPA0 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://backstage.forgerock.com/knowledge/kb/article/a50037155#x7ZPA0 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | 5.5.2 | |
forgerock | access_management | 6.0.0 | |
forgerock | access_management | 6.0.0.1 | |
forgerock | access_management | 6.0.0.2 | |
forgerock | access_management | 6.0.0.3 | |
forgerock | access_management | 6.0.0.4 | |
forgerock | access_management | 6.0.0.6 | |
forgerock | access_management | 6.0.0.7 | |
forgerock | access_management | 6.5.0 | |
forgerock | access_management | 6.5.0.1 | |
forgerock | access_management | 6.5.0.2 | |
forgerock | access_management | 6.5.1 | |
forgerock | access_management | 6.5.2.1 | |
forgerock | access_management | 6.5.2.2 | |
forgerock | access_management | 6.5.2.3 | |
forgerock | access_management | 6.5.3 | |
forgerock | access_management | 7.0.0 | |
forgerock | access_management | 7.0.1 | |
forgerock | access_management | 7.0.2 | |
forgerock | access_management | 7.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "81409362-E21B-4956-BE64-7A07188DDB77", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F11F7FD9-9FB7-472F-B4CA-E2EBF3930051", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A2E2315-212A-4652-84D9-3E962FB97238", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "17E11560-BB97-4A62-B6FE-004E9CD7AABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "53CC11DF-351C-4412-B44B-DDA7A9229812", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "61C0168C-C23E-4282-8CE4-557624BAC52B", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "029858A3-5920-41FA-96A9-5973802C4995", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "43A69DFF-405B-4869-A570-C39521262D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B8556CA-F9C8-4DF8-8951-EB58CE02A639", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "37945318-07E9-4E2E-B71E-0DD7F5630571", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7480E543-6823-4E2E-AEDD-A9BC21609E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E31AD7C7-9145-4EBC-A1A1-531B77BEFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1431E8B-A15E-4ED9-97D9-7E9226C23863", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E78929D6-90B5-4FB2-BCA0-327D69D85C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EE525AD5-4B68-4063-A183-FA63B9EC7FF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F3D7F2DE-8E77-4268-9F8B-D95954A31140", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "133B3A99-A25A-46A7-8663-282B7146E33C", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0054E664-0BB8-49B9-8793-03C26873F139", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "93E6DB1C-1085-4F63-9FA5-19D3E8B80A34", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9725E909-8707-402E-939B-EC6FA6FA0984", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing access control in ForgeRock Access Management 7.1.0 and earlier versions on all platforms allows remote unauthenticated attackers to hijack sessions, including potentially admin-level sessions. This issue affects: ForgeRock Access Management 7.1 versions prior to 7.1.1; 6.5 versions prior to 6.5.4; all previous versions." }, { "lang": "es", "value": "Una falta de control de acceso en ForgeRock Access Management versi\u00f3n 7.1.0 y versiones anteriores, en todas las plataformas permite a atacantes remotos no autenticados secuestrar sesiones, incluyendo potencialmente sesiones a nivel de administrador. Este problema afecta a: ForgeRock Access Management versiones 7.1 anteriores a 7.1.1; versiones 6.5 anteriores a 6.5.4; todas las versiones anteriores" } ], "id": "CVE-2021-4201", "lastModified": "2024-11-21T06:37:08.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "psirt@forgerock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-14T22:15:07.830", "references": [ { "source": "psirt@forgerock.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a50037155#x7ZPA0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a50037155#x7ZPA0" } ], "sourceIdentifier": "psirt@forgerock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "psirt@forgerock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-14 15:15
Modified
2024-11-21 07:20
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Improper Authorization vulnerability in ForgeRock Inc. Access Management allows Authentication Bypass. This issue affects Access Management: from 6.5.0 through 7.2.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "4AC241F8-7562-4EF8-9F10-A4E0FC698CD1", "versionEndIncluding": "7.2.0", "versionStartIncluding": "6.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Authorization vulnerability in ForgeRock Inc. Access Management allows Authentication Bypass.\u00a0This issue affects Access Management: from 6.5.0 through 7.2.0." } ], "id": "CVE-2022-3748", "lastModified": "2024-11-21T07:20:10.317", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "psirt@forgerock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-14T15:15:07.413", "references": [ { "source": "psirt@forgerock.com", "tags": [ "Permissions Required" ], "url": "https://backstage.forgerock.com/downloads/browse/am/all/productId:am" }, { "source": "psirt@forgerock.com", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a34332318" }, { "source": "psirt@forgerock.com", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a92134872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://backstage.forgerock.com/downloads/browse/am/all/productId:am" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a34332318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a92134872" } ], "sourceIdentifier": "psirt@forgerock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "psirt@forgerock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-21 00:29
Modified
2024-11-21 04:11
Severity ?
Summary
The REST APIs in ForgeRock AM before 5.5.0 include SSOToken IDs as part of the URL, which allows attackers to obtain sensitive information by finding an ID value in a log file.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://backstage.forgerock.com/knowledge/kb/book/b21824339 | Vendor Advisory | |
cve@mitre.org | https://hansesecure.de/vulnerability-in-am/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://backstage.forgerock.com/knowledge/kb/book/b21824339 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://hansesecure.de/vulnerability-in-am/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBBE1789-2E45-40FC-9EFA-AE87C95ABCCD", "versionEndExcluding": "5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The REST APIs in ForgeRock AM before 5.5.0 include SSOToken IDs as part of the URL, which allows attackers to obtain sensitive information by finding an ID value in a log file." }, { "lang": "es", "value": "Las API REST en ForgeRock AM, en versiones anteriores a la 5.5.0, incluyen ID SSOToken como parte de la URL. Esto permite que atacantes obtengan informaci\u00f3n sensible encontrando un valor de ID en un archivo de registro." } ], "id": "CVE-2018-7272", "lastModified": "2024-11-21T04:11:54.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-21T00:29:00.270", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/book/b21824339" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://hansesecure.de/vulnerability-in-am/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/book/b21824339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://hansesecure.de/vulnerability-in-am/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-29 16:15
Modified
2024-11-08 15:38
Severity ?
Summary
An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * | |
forgerock | access_management | * | |
forgerock | access_management | * | |
forgerock | access_management | 7.3.0 | |
forgerock | access_management | 7.3.1 | |
forgerock | access_management | 7.4.0 | |
forgerock | access_management | 7.4.1 | |
forgerock | access_management | 7.5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FFF5D8C-AF14-4120-BD21-E90C168FDE83", "versionEndIncluding": "7.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DC330E6-C70E-4035-A894-CE9F6BC4E30A", "versionEndIncluding": "7.1.4", "versionStartIncluding": "7.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D9F54DE-CA12-455F-98E3-B0AEC64DF3A3", "versionEndIncluding": "7.2.2", "versionStartIncluding": "7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2B38BE7-6A73-400C-B6CC-FED6C0FE7612", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A79687F-7972-4032-8694-A4567531292F", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CC06681-7D1B-4F04-80BD-AE5BC3E283BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "C94CD667-557E-476A-8950-2123793CFE4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:forgerock:access_management:7.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C15731F3-5D9E-49B2-85AE-3F220D672031", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks" }, { "lang": "es", "value": "Existe una vulnerabilidad de redireccionamiento abierto en PingAM, en la que las solicitudes bien manipuladas pueden provocar una validaci\u00f3n incorrecta de las URL de redireccionamiento. Esto podr\u00eda permitir que un atacante redirija a los usuarios finales a sitios maliciosos bajo su control, lo que simplifica los ataques de phishing." } ], "id": "CVE-2024-25566", "lastModified": "2024-11-08T15:38:56.150", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "responsible-disclosure@pingidentity.com", "type": "Secondary" } ] }, "published": "2024-10-29T16:15:04.947", "references": [ { "source": "responsible-disclosure@pingidentity.com", "tags": [ "Product" ], "url": "https://backstage.forgerock.com/downloads/browse/am/featured" }, { "source": "responsible-disclosure@pingidentity.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/advisories/article/a63463303" } ], "sourceIdentifier": "responsible-disclosure@pingidentity.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "responsible-disclosure@pingidentity.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-25 21:15
Modified
2024-11-21 06:14
Severity ?
Summary
In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://backstage.forgerock.com/knowledge/kb/article/a55763454 | Vendor Advisory | |
cve@mitre.org | https://www.forgerock.com/platform/access-management | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://backstage.forgerock.com/knowledge/kb/article/a55763454 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.forgerock.com/platform/access-management | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
forgerock | access_management | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "4581CFF0-F5D2-4DF6-8E87-DCF74DAC775C", "versionEndExcluding": "7.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion." }, { "lang": "es", "value": "En ForgeRock Access Management (AM) versiones anteriores a 7.0.2, la implementaci\u00f3n de SAML2 permite una inyecci\u00f3n de XML, permitiendo potencialmente una aserci\u00f3n fraudulenta de SAML versi\u00f3n 2.0." } ], "id": "CVE-2021-37154", "lastModified": "2024-11-21T06:14:44.580", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-25T21:15:08.470", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.forgerock.com/platform/access-management" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://backstage.forgerock.com/knowledge/kb/article/a55763454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.forgerock.com/platform/access-management" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-91" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }