An attacker can use the unrestricted LDAP queries to determine configuration entries
| Software | From | Fixed in |
|---|---|---|
| forgerock / access_management | 6.5.1 | 6.5.1.x |
| forgerock / access_management | 6.5.3 | 6.5.3.x |
| forgerock / access_management | 7.1.0 | 7.1.0.x |
| forgerock / access_management | 6.5.4 | 6.5.4.x |
| forgerock / access_management | 6.0.0 | 6.0.0.7.x |
| forgerock / access_management | 6.5.0 | 6.5.0.2.x |
| forgerock / access_management | 6.5.2.1 | 6.5.2.3.x |
| forgerock / access_management | 7.0.0 | 7.0.2.x |
| forgerock / access_management | 7.1.1 | 7.1.1.x |