CVE-2017-7589

In OpenIDM through 4.0.0 before 4.5.0, the info endpoint may leak sensitive information upon a request by the "anonymous" user, as demonstrated by responses with a 200 HTTP status code and a JSON object containing IP address strings. This is related to a missing access-control check in bin/defaults/script/info/login.js.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openidm_project:openidm:*:*:*:*:*:*:*:*
cpe:2.3:a:openidm_project:openidm:4.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:32

Type Values Removed Values Added
References () http://www.rootlabs.com.br/information-disclosure-forgerock-openidm-4-0-0-and-4-5-0/ - Exploit, Third Party Advisory () http://www.rootlabs.com.br/information-disclosure-forgerock-openidm-4-0-0-and-4-5-0/ - Exploit, Third Party Advisory
References () https://backstage.forgerock.com/knowledge/kb/article/a92936505 - Mitigation, Third Party Advisory () https://backstage.forgerock.com/knowledge/kb/article/a92936505 - Mitigation, Third Party Advisory

Information

Published : 2017-04-09 01:59

Updated : 2024-11-21 03:32


NVD link : CVE-2017-7589

Mitre link : CVE-2017-7589

CVE.ORG link : CVE-2017-7589


JSON object : View

Products Affected

openidm_project

  • openidm
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor