CVE-2021-35464

ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*
cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*

History

14 Mar 2025, 16:45

Type Values Removed Values Added
CPE cpe:2.3:a:forgerock:am:*:*:*:*:*:*:*:* cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*
First Time Forgerock access Management

21 Nov 2024, 06:12

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://backstage.forgerock.com/knowledge/kb/article/a47894244 - Exploit, Vendor Advisory () https://backstage.forgerock.com/knowledge/kb/article/a47894244 - Exploit, Vendor Advisory
References () https://bugster.forgerock.org - Broken Link () https://bugster.forgerock.org - Broken Link

Information

Published : 2021-07-22 18:15

Updated : 2025-03-14 16:45


NVD link : CVE-2021-35464

Mitre link : CVE-2021-35464

CVE.ORG link : CVE-2021-35464


JSON object : View

Products Affected

forgerock

  • openam
  • access_management
CWE
CWE-502

Deserialization of Untrusted Data