Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-29156 PoC — Forgerock ForgeRock OpenAM 注入漏洞

Source
Associated Vulnerability
Title:Forgerock ForgeRock OpenAM 注入漏洞 (CVE-2021-29156)
Description:Forgerock ForgeRock OpenAM是美国ForgeRock(Forgerock)公司的一套开源的单点登录框架(SSO)。该框架通过提供核心的标识服务(CoreServer)以实现在一个网络架构中的透明单点登录(如集中式、分布式的单点登录)。 ForgeRock OpenAM before 13.5.1 存在注入漏洞,攻击者可利用该漏洞可以逐个字符地检索密码散列,或者检索会话令牌或私钥。
Description
Proof-of-Concept tool for CVE-2021-29156, an LDAP injection vulnerability in ForgeRock OpenAM v13.0.0.
Readme
# CVE-2021-29156 Proof-of-Concept
(c) 2021 [GuidePoint Security](https://www.guidepointsecurity.com/)
Charlton Trezevant [charlton.trezevant@guidepointsecurity.com](mailto:charlton.trezevant@guidepointsecurity.com)

## Background

Today GuidePoint is pleased to [release](https://github.com/guidepointsecurity/CVE-2021-29156) a functional Proof-of-Concept tool for [CVE-2021-29156](https://nvd.nist.gov/vuln/detail/CVE-2021-29156), an LDAP injection vulnerability in ForgeRock OpenAM [v13.0.0](https://github.com/OpenIdentityPlatform/OpenAM/releases/tag/13.0.0). This vulnerability allows an attacker to extract a variety of information (such as a user’s password hash) from vulnerable OpenAM servers using a character-by-character brute force attack.

## Usage

To use this tool, simply adjust the `baseURL`, `proxy`, and `user` variables and run the script.

By default, this tool is configured to extract the password hash of the `amAdmin` user. As valid characters are discovered, the password hash string will be displayed in the console. Further adjustments may be made to the LDAP injection payloads if exfiltration of other data from the OpenAM instance is desired. 

## Additional Resources

For a more in-depth look at this vulnerability, PortSwigger has an [excellent writeup](https://portswigger.net/research/hidden-oauth-attack-vectors) of the exploit itself and its theory of operation.

File Snapshot

[4.0K] /data/pocs/ac07fd91034618cc9d11bb55cf2781a675c3ec72 ├── [9.7K] main.go └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.