QID 730675
Date Published: 2022-12-09
QID 730675: ForgeRock Access Management and OpenAM Remote Code Execution (RCE) Vulnerability
AM provides a service called access management, which manages access to resources, such as a web page, an application, or web service, available over the network.
Affected Versions:
ForgeRock Access Management version 5.x
ForgeRock Access Management versions 6.0.0.x, 6.5.0.x, 6.5.1, 6.5.2.x and 6.5.3
OpenAM versions 9.x, 10.x, 11.x, 12.x, 13.x and 14.x (prior to 14.6.3)
QID Detection Logic (Unauthenticated):
QID Sends a POST request with a malicious serialized payload and custom headers to "/openam/ccversion/Version", "/am/ccversion/Version", "/am7/ccversion/Version"., "/openam6/ccversion/Version", "/ccversion/Version","/OpenAM/ccversion/Version" and "/openAM/ccversion/Version".
Successful exploitation of this vulnerability may allow an unauthenticated remote attacker to execute arbitrary code on the target system.
Disable the VersionServlet mapping by commenting out the following section in the AM web.xml file (for example, this file is located in the /path/to/tomcat/webapps/openam/WEB-INF directory for Apache Tomcat):
- ForgeRock Access Management Security Advisory -
backstage.forgerock.com/knowledge/kb/article/a47894244
CVEs related to QID 730675
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ForgeRock Access Management Security Advisory |
|