ForgeRock OpenAM < 7.0 Remote Code Execution

critical Web App Scanning Plugin ID 112812

Synopsis

ForgeRock OpenAM < 7.0 Remote Code Execution

Description

ForgeRock OpenAM is a popular access management software which is used to provide single sign-on (SSO) features to web applications. ForgeRock OpenAM versions below 7.0 suffer from a deserialization vulnerability, allowing a remote unauthenticated attacker to perform remote code execution on the target application.

Solution

As a temporary workaround, disable the VersionServlet mapping in the web.xml file or block access to the `ccversion` endpoint with a reverse proxy. Upgrade at least to version 7.0 to fix the issue.

See Also

https://backstage.forgerock.com/knowledge/kb/book/b21824339#a47894244

https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464

Plugin Details

Severity: Critical

ID: 112812

Type: remote

Published: 6/30/2021

Updated: 9/7/2021

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-35464

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2021-35464

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

CISA Known Exploited Vulnerability Due Dates: 11/17/2021

Reference Information

CVE: CVE-2021-35464