Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-29156
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Forgerock ForgeRock OpenAM 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Forgerock ForgeRock OpenAM是美国ForgeRock(Forgerock)公司的一套开源的单点登录框架(SSO)。该框架通过提供核心的标识服务(CoreServer)以实现在一个网络架构中的透明单点登录(如集中式、分布式的单点登录)。 ForgeRock OpenAM before 13.5.1 存在注入漏洞,攻击者可利用该漏洞可以逐个字符地检索密码散列,或者检索会话令牌或私钥。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2021-29156
#POC DescriptionSource LinkShenlong Link
1Proof-of-Concept tool for CVE-2021-29156, an LDAP injection vulnerability in ForgeRock OpenAM v13.0.0.https://github.com/guidepointsecurity/CVE-2021-29156POC Details
2Exploit for CVE-2021-29156https://github.com/5amu/CVE-2021-29156POC Details
3OpenAM contains an LDAP injection vulnerability. When a user tries to reset his password, they are asked to enter username, and then the backend validates whether the user exists or not through an LDAP query. If the user exists, the password reset token is sent to the user's email. Enumeration can allow for full password retrieval.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-29156.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-29156
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-29156

No comments yet


Leave a comment