An attacker can use the unrestricted LDAP queries to determine configuration entries
Solution:
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://backstage.forgerock.com/knowledge/kb/article/a90639318 | vendor advisory |
https://backstage.forgerock.com/downloads/browse/am/featured | product |