In OpenIDM through 4.0.0 before 4.5.0, the info endpoint may leak sensitive information upon a request by the "anonymous" user, as demonstrated by responses with a 200 HTTP status code and a JSON object containing IP address strings. This is related to a missing access-control check in bin/defaults/script/info/login.js.
References
Link | Resource |
---|---|
http://www.rootlabs.com.br/information-disclosure-forgerock-openidm-4-0-0-and-4-5-0/ | Exploit Third Party Advisory |
https://backstage.forgerock.com/knowledge/kb/article/a92936505 | Mitigation Third Party Advisory |
http://www.rootlabs.com.br/information-disclosure-forgerock-openidm-4-0-0-and-4-5-0/ | Exploit Third Party Advisory |
https://backstage.forgerock.com/knowledge/kb/article/a92936505 | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.rootlabs.com.br/information-disclosure-forgerock-openidm-4-0-0-and-4-5-0/ - Exploit, Third Party Advisory | |
References | () https://backstage.forgerock.com/knowledge/kb/article/a92936505 - Mitigation, Third Party Advisory |
Information
Published : 2017-04-09 01:59
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7589
Mitre link : CVE-2017-7589
CVE.ORG link : CVE-2017-7589
JSON object : View
Products Affected
openidm_project
- openidm
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor