CVE-2021-35464
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
Analysis
ForgeRock AM (Access Management) before version 7.0 contains a Java deserialization vulnerability in the jato.pageSession parameter enabling unauthenticated remote code execution via a single HTTP request.
Technical Context
The CWE-502 deserialization flaw in the jato.pageSession parameter processes untrusted serialized Java objects. ForgeRock AM inherits the Sun ONE/OpenSSO framework's session serialization, which uses Java's default ObjectInputStream without class filtering, allowing gadget chain exploitation.
Affected Products
['ForgeRock AM server before 7.0', 'OpenAM-based deployments']
Remediation
Upgrade to ForgeRock AM 7.0+. Apply the provided security patch for older versions. Monitor for exploitation indicators in access logs (unusual requests to /ccversion/). Restrict access to AM administrative endpoints.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today