2021-07-11 09:09:41 +00:00
id : CVE-2021-29156
info :
2022-01-24 18:45:03 +00:00
name : LDAP Injection In OpenAM
2021-07-11 09:09:41 +00:00
author : melbadry9,xelkomy
severity : high
2022-05-17 09:18:12 +00:00
description : OpenAM contains an LDAP injection vulnerability. When a user tries to reset his password, they are asked to enter username, and then the backend validates whether the user exists or not through an LDAP query. If the user exists, the password reset token is sent to the user's email. Enumeration can allow for full password retrieval.
2023-09-06 12:09:01 +00:00
remediation : Upgrade to OpenAM commercial version 13.5.1 or later.
2022-01-25 16:38:01 +00:00
reference :
2022-05-17 09:18:12 +00:00
- https://github.com/sullo/advisory-archives/blob/master/Forgerock_OpenAM_LDAP_injection.md https://hackerone.com/reports/1278050 https://www.guidepointsecurity.com/blog/ldap-injection-in-forgerock-openam-exploiting-cve-2021-29156/ https://portswigger.net/research/hidden-oauth-attack-vectors
- https://portswigger.net/research/hidden-oauth-attack-vectors
- https://bugster.forgerock.org/jira/browse/OPENAM-10135
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 7.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-29156
cwe-id : CWE-74
2023-10-30 20:55:37 +00:00
epss-score : 0.36709
2023-11-20 05:10:39 +00:00
epss-percentile : 0.9679
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:forgerock:openam:*:*:*:*:*:*:*:*
2022-07-10 09:37:30 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 3
2023-07-11 19:49:27 +00:00
vendor : forgerock
product : openam
2023-09-06 12:09:01 +00:00
shodan-query : http.title:"OpenAM"
2022-04-22 10:38:41 +00:00
tags : cve,cve2021,openam,ldap,injection
2021-07-11 09:09:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-11 09:09:41 +00:00
- method : GET
path :
- "{{BaseURL}}/openam/ui/PWResetUserValidation"
- "{{BaseURL}}/OpenAM-11.0.0/ui/PWResetUserValidation"
- "{{BaseURL}}/ui/PWResetUserValidation"
matchers :
- type : dsl
dsl :
- 'contains(body, "jato.pageSession") && status_code==200'
2023-11-19 08:30:54 +00:00
# digest: 4a0a004730450220080e7500d889bec8e56e4e3a4f6dfed999beb52a4762d1742e44e3c0176c5de6022100a143e8331bfa40e343d36d40f48a8841658c4d0e3cdd117bfa0c06ecdfcdc651:922c64590222798bb761d5b6d8e72950