ForgeRock OpenAM LDAP Injection

high Web App Scanning Plugin ID 112973

Synopsis

ForgeRock OpenAM LDAP Injection

Description

ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol or the password reset feature. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.

Solution

Update your ForgeRock OpenAM installation to at least version 13.5.1

See Also

https://blog.cybercastle.io/ldap-injection-in-openam/

https://bugster.forgerock.org/jira/browse/OPENAM-10135

https://portswigger.net/research/hidden-oauth-attack-vectors

Plugin Details

Severity: High

ID: 112973

Type: remote

Published: 9/13/2021

Updated: 9/13/2021

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-29156

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS Score Source: CVE-2021-29156

Vulnerability Information

CPE: cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2021-29156