CVE-2021-35464

Published Jul 22, 2021

Last updated 3 years ago

Overview

Description
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
10
Impact score
10
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
ForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability
Exploit added on
Nov 3, 2021
Exploit action due
Nov 17, 2021
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-502

Social media

Hype score
Not currently trending

Configurations