First published: Thu Jul 22 2021(Updated: )
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ForgeRock AM | >=5.0.0<6.5.3 | |
ForgeRock OpenAM | >=9.0.0<14.6.3 | |
ForgeRock Access Management (AM) | ||
>=5.0.0<6.5.3 | ||
>=9.0.0<14.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35464 is a Java deserialization vulnerability in the ForgeRock Access Management (AM) Core Server.
CVE-2021-35464 has a severity rating of critical.
CVE-2021-35464 allows remote code execution by exploiting a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages of the ForgeRock AM server.
No, CVE-2021-35464 exploitation does not require authentication.
To fix CVE-2021-35464, you should upgrade your ForgeRock AM server to version 7.0 or newer.