Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-29156 PoC — Forgerock ForgeRock OpenAM 注入漏洞

Source
Associated Vulnerability
Title:Forgerock ForgeRock OpenAM 注入漏洞 (CVE-2021-29156)
Description:ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.
Description
Proof-of-Concept tool for CVE-2021-29156, an LDAP injection vulnerability in ForgeRock OpenAM v13.0.0.
Readme
# CVE-2021-29156 Proof-of-Concept
(c) 2021 [GuidePoint Security](https://www.guidepointsecurity.com/)
Charlton Trezevant [charlton.trezevant@guidepointsecurity.com](mailto:charlton.trezevant@guidepointsecurity.com)

## Background

Today GuidePoint is pleased to [release](https://github.com/guidepointsecurity/CVE-2021-29156) a functional Proof-of-Concept tool for [CVE-2021-29156](https://nvd.nist.gov/vuln/detail/CVE-2021-29156), an LDAP injection vulnerability in ForgeRock OpenAM [v13.0.0](https://github.com/OpenIdentityPlatform/OpenAM/releases/tag/13.0.0). This vulnerability allows an attacker to extract a variety of information (such as a user’s password hash) from vulnerable OpenAM servers using a character-by-character brute force attack.

## Usage

To use this tool, simply adjust the `baseURL`, `proxy`, and `user` variables and run the script.

By default, this tool is configured to extract the password hash of the `amAdmin` user. As valid characters are discovered, the password hash string will be displayed in the console. Further adjustments may be made to the LDAP injection payloads if exfiltration of other data from the OpenAM instance is desired. 

## Additional Resources

For a more in-depth look at this vulnerability, PortSwigger has an [excellent writeup](https://portswigger.net/research/hidden-oauth-attack-vectors) of the exploit itself and its theory of operation.

File Snapshot

[4.0K] /data/pocs/ac07fd91034618cc9d11bb55cf2781a675c3ec72 ├── [9.7K] main.go └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →