An attacker can use the unrestricted LDAP queries to determine configuration entries
Name | Vendor | Start Version | End Version |
---|---|---|---|
Access_management | Forgerock | 6.0.0 (including) | 6.0.0.7 (including) |
Access_management | Forgerock | 6.5.0 (including) | 6.5.0.2 (including) |
Access_management | Forgerock | 6.5.2.1 (including) | 6.5.2.3 (including) |
Access_management | Forgerock | 7.0.0 (including) | 7.0.2 (including) |
Access_management | Forgerock | 6.5.1 (including) | 6.5.1 (including) |
Access_management | Forgerock | 6.5.3 (including) | 6.5.3 (including) |
Access_management | Forgerock | 6.5.4 (including) | 6.5.4 (including) |
Access_management | Forgerock | 7.1.0 (including) | 7.1.0 (including) |
Access_management | Forgerock | 7.1.1 (including) | 7.1.1 (including) |