Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6x75-vwp5-q242

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

ForgeRock AM server 6.x before 7, and OpenAM 14.6.3, has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/Version request to the server. The vulnerability exists due to incorrect usage of Sun ONE Application Framework (JATO).

ForgeRock AM server 6.x before 7, and OpenAM 14.6.3, has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/Version request to the server. The vulnerability exists due to incorrect usage of Sun ONE Application Framework (JATO).

EPSS

Процентиль: 100%
0.94386
Критический

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier

CVSS3: 9.8
fstec
больше 4 лет назад

Уязвимость программных средств управления доступом и правами Access Management (AM) и OpenAM, связанная с недостатками механизма десериализации данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94386
Критический

9.8 Critical

CVSS3

Дефекты

CWE-502