It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services.
Solution:
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://backstage.forgerock.com/knowledge/kb/article/a90639318 | vendor advisory |
https://backstage.forgerock.com/downloads/browse/am/featured | product |