QID 730675

Date Published: 2022-12-09

QID 730675: ForgeRock Access Management and OpenAM Remote Code Execution (RCE) Vulnerability

AM provides a service called access management, which manages access to resources, such as a web page, an application, or web service, available over the network.

Affected Versions:
ForgeRock Access Management version 5.x
ForgeRock Access Management versions 6.0.0.x, 6.5.0.x, 6.5.1, 6.5.2.x and 6.5.3
OpenAM versions 9.x, 10.x, 11.x, 12.x, 13.x and 14.x (prior to 14.6.3)

QID Detection Logic (Unauthenticated):
QID Sends a POST request with a malicious serialized payload and custom headers to "/openam/ccversion/Version", "/am/ccversion/Version", "/am7/ccversion/Version"., "/openam6/ccversion/Version", "/ccversion/Version","/OpenAM/ccversion/Version" and "/openAM/ccversion/Version".

Successful exploitation of this vulnerability may allow an unauthenticated remote attacker to execute arbitrary code on the target system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Please refer to ForgeRock Access Management Security Advisory Page for updates and patch information.Workaround:
    Disable the VersionServlet mapping by commenting out the following section in the AM web.xml file (for example, this file is located in the /path/to/tomcat/webapps/openam/WEB-INF directory for Apache Tomcat):
    Vendor References

    CVEs related to QID 730675

    Software Advisories
    Advisory ID Software Component Link
    ForgeRock Access Management Security Advisory URL Logo backstage.forgerock.com/knowledge/kb/article/a47894244