ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
History

Fri, 14 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Forgerock access Management
CPEs cpe:2.3:a:forgerock:am:*:*:*:*:*:*:*:* cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*
Vendors & Products Forgerock am
Forgerock access Management

Tue, 04 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-04T19:41:10.440Z

Reserved: 2021-06-23T00:00:00.000Z

Link: CVE-2021-35464

cve-icon Vulnrichment

Updated: 2024-08-04T00:40:45.949Z

cve-icon NVD

Status : Analyzed

Published: 2021-07-22T18:15:23.247

Modified: 2025-03-14T16:45:41.233

Link: CVE-2021-35464

cve-icon Redhat

No data.