AM Security Advisory #202403
A security vulnerability has been discovered in supported versions of PingAM (formerly known as ForgeRock Access Management). This vulnerability affects all supported versions, and could be present in older unsupported versions. You should secure your deployments at the earliest opportunity as outlined in this security advisory.
PingOne Advanced Identity Cloud customers
This security advisory only applies to software deployments of the ForgeRock Identity Platform. All relevant patches from this advisory have already been applied to the PingOne Advanced Identity Cloud.
October 29, 2024
A security vulnerability has been discovered in supported versions of PingAM. This vulnerability affects versions from PingAM 7.0.0 up to and including PingAM 7.5.0 as well as older unsupported versions.
The highest severity of issues in this advisory is Medium.
Note
The advice is to upgrade to the latest version to fix these issues. Alternatively, if that’s not possible at this time, you can apply a workaround (if one is provided) or apply one of the patches to mitigate these issues.
Details about these vulnerabilities are deliberately kept to a minimum to protect your deployments and prevent someone trying to exploit them in the field. Please do not ask for steps to reproduce for the same reasons.
You can download patches from Backstage for the following versions:
See How do I install a PingAM (AM) patch supplied by Ping support? for further information on deploying the patch. If you have existing patches, please raise a ticket to obtain an updated patch.
Issue #202403-01 (CVE-2024-25566)
Affected versions | PingAM 7.0.0 up to and including PingAM 7.5.0 (and older unsupported versions) |
Fixed versions | PingAM 7.5.1 |
Component | Core Server |
Severity | Medium |
Description:
An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks
Workaround:
Block or filter access to the affected endpoints if not in use:
- OAuthPwd.jsp, OAuthActivate.jsp (deprecated OAuth module endpoints)
- wsfederation/jsp/ WSFederation endpoints
- oauth2/authorize endpoint. The oauth2/authorize endpoint may be accessible even if OAuth2 is not configured.The oauth2/authorize endpoint is used in certain OAuth2/OIDC flows and by Java or Web Agents 5 and above
Resolution:
Deploy the relevant patch bundle.
See Also:
Change Log
The following table tracks changes to the security advisory:
Date | Description |
Dec 13, 2024 | Added PingAM 7.5.1 as a fixed version |
Jan 7, 2025 | Added PingAM 7.3.2 as a fixed version |