7.5
CWE
74
Advisory Published
Updated

CVE-2021-29156

First published: Thu Mar 25 2021(Updated: )

ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
ForgeRock OpenAM<13.5.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-29156?

    CVE-2021-29156 is a vulnerability in ForgeRock OpenAM versions before 13.5.1 that allows LDAP injection via the Webfinger protocol.

  • How does CVE-2021-29156 impact the system?

    CVE-2021-29156 allows an unauthenticated attacker to perform character-by-character retrieval of password hashes, retrieve a session token, or a private key.

  • How severe is CVE-2021-29156?

    CVE-2021-29156 has a severity rating of 7.5 (high).

  • How can I fix CVE-2021-29156?

    To fix CVE-2021-29156, upgrade ForgeRock OpenAM to version 13.5.1 or later.

  • Are there any references for more information about CVE-2021-29156?

    Yes, you can find more information about CVE-2021-29156 at the following references: [1] [2]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203