Enhancement: cves/2021/CVE-2021-29156.yaml by cs
parent
db5d0dfa3e
commit
44d23ef3eb
|
@ -1,12 +1,17 @@
|
|||
id: CVE-2021-29156
|
||||
|
||||
info:
|
||||
name: LDAP Injection In Openam
|
||||
name: LDAP Injection In OpenAM
|
||||
author: melbadry9,xelkomy
|
||||
severity: high
|
||||
tags: cve,cve2021,openam,ldap,injection
|
||||
description: The vulnerability was found in the password reset feature that OpenAM provides. When a user tries to reset his password, he is asked to enter his username then the backend validates whether the user exists or not through an LDAP query before the password reset token is sent to the user’s email.
|
||||
reference: https://blog.cybercastle.io/ldap-injection-in-openam/
|
||||
description: OpenAM contains an LDAP injection vulnerability. When a user tries to reset his password, they are asked to enter username, and then the backend validates whether the user exists or not through an LDAP query. If the user exists, the password reset token is sent to the user's email. Enumeration can allow for full password retrieval.
|
||||
remediation: Upgrade to OpenAM commercial version 13.5.1 or later.
|
||||
reference:
|
||||
https://github.com/sullo/advisory-archives/blob/master/Forgerock_OpenAM_LDAP_injection.md
|
||||
https://hackerone.com/reports/1278050
|
||||
https://www.guidepointsecurity.com/blog/ldap-injection-in-forgerock-openam-exploiting-cve-2021-29156/
|
||||
https://portswigger.net/research/hidden-oauth-attack-vectors
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.50
|
||||
|
@ -24,3 +29,5 @@ requests:
|
|||
- type: dsl
|
||||
dsl:
|
||||
- 'contains(body, "jato.pageSession") && status_code==200'
|
||||
|
||||
# Enhanced by cs on 2022/01/24
|
||||
|
|
Loading…
Reference in New Issue