9.8
CVSSv3

CVE-2021-35464

Published: 22/07/2021 Updated: 02/08/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

ForgeRock AM server prior to 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

forgerock am

forgerock openam

Exploits

ForgeRock Access Manager/OpenAM version 1463 unauthenticated remote code execution exploit ...
This Metasploit module leverages a pre-authentication remote code execution vulnerability in the OpenAM identity and access management solution The vulnerability arises from a Java deserialization flaw in OpenAM's implementation of the Jato framework and can be triggered by a simple one-line GET or POST request to a vulnerable endpoint Successful ...

Github Repositories

openam-CVE-2021-35464 tomcat 执行命令回显

openam CVE-2021-35464 tomcat 执行命令回显 项目基于 ysoserial 和 Java-Rce-Echo 构建项目需要在依赖中加入ysoserialjar和jato-1463jar POST /OpenAM/ccversion/Version HTTP/11 Host: phplocal:8081 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/50 (Windows NT 100; Win64; x64) AppleWebKit/53736 (KHTML, like Gecko) Chrome/9104472124 Safari/53736 Acc