It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services.
| Software | From | Fixed in |
|---|---|---|
| forgerock / access_management | 6.5.1 | 6.5.1.x |
| forgerock / access_management | 6.5.3 | 6.5.3.x |
| forgerock / access_management | 7.1.0 | 7.1.0.x |
| forgerock / access_management | 6.5.4 | 6.5.4.x |
| forgerock / access_management | 6.0.0 | 6.0.0.7.x |
| forgerock / access_management | 6.5.0 | 6.5.0.2.x |
| forgerock / access_management | 6.5.2.1 | 6.5.2.3.x |
| forgerock / access_management | 7.0.0 | 7.0.2.x |