Show filters
14 Total Results
Displaying 1-10 of 14
Sort by:
Attacker Value
Very High

Pre-auth RCE in ForgeRock Access Manager (CVE-2021-35464)

Disclosure Date: July 22, 2021 (last updated October 07, 2023)
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
Attacker Value
Unknown

CVE-2024-41667

Disclosure Date: July 24, 2024 (last updated August 06, 2024)
OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default OpenAM login, they did not restrict the `CustomLoginUrlTemplate`, allowing it to be set freely. Commit fcb8432aa77d5b2e147624fe954cb150c568e0b8 introduces `TemplateClassResolver.SAFER_RESOLVER` to disable the resolution of commonly exploited classes in FreeMarker template injection. As of time of publication, this fix is expected to be part of version 15.0.4.
0
Attacker Value
Unknown

CVE-2023-37471

Disclosure Date: July 20, 2023 (last updated October 08, 2023)
Open Access Management (OpenAM) is an access management solution that includes Authentication, SSO, Authorization, Federation, Entitlements and Web Services Security. OpenAM up to version 14.7.2 does not properly validate the signature of SAML responses received as part of the SAMLv1.x Single Sign-On process. Attackers can use this fact to impersonate any OpenAM user, including the administrator, by sending a specially crafted SAML response to the SAMLPOSTProfileServlet servlet. This problem has been patched in OpenAM 14.7.3-SNAPSHOT and later. User unable to upgrade should comment servlet `SAMLPOSTProfileServlet` from their pom file. See the linked GHSA for details.
Attacker Value
Unknown

CVE-2023-22320

Disclosure Date: January 10, 2023 (last updated October 08, 2023)
OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability(CWE-22). Furthermore, a crafted URL may be evaluated incorrectly.
Attacker Value
Unknown

CVE-2022-31735

Disclosure Date: September 15, 2022 (last updated October 08, 2023)
OpenAM Consortium Edition version 14.0.0 provided by OpenAM Consortium contains an open redirect vulnerability (CWE-601). When accessing an affected server through some specially crafted URL, the user may be redirected to an arbitrary website.
Attacker Value
Unknown

CVE-2022-34298

Disclosure Date: June 23, 2022 (last updated October 07, 2023)
The NT auth module in OpenAM before 14.6.6 allows a "replace Samba username attack."
Attacker Value
Unknown

CVE-2021-29156

Disclosure Date: March 25, 2021 (last updated February 22, 2025)
ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.
Attacker Value
Unknown

CVE-2017-14394

Disclosure Date: June 19, 2019 (last updated November 27, 2024)
OAuth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to perform phishing via an unvalidated redirect.
0
Attacker Value
Unknown

CVE-2017-14395

Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Auth 2.0 Authorization Server of ForgeRock Access Management (OpenAM) 13.5.0-13.5.1 and Access Management (AM) 5.0.0-5.1.1 does not correctly validate redirect_uri for some invalid requests, which allows attackers to execute a script in the user's browser via reflected XSS.
0
Attacker Value
Unknown

CVE-2019-5915

Disclosure Date: February 13, 2019 (last updated November 27, 2024)
Open redirect vulnerability in OpenAM (Open Source Edition) 13.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted page.
0