Medium severity6.5NVD Advisory· Published Apr 9, 2017· Updated May 13, 2026
CVE-2017-7589
CVE-2017-7589
Description
In OpenIDM through 4.0.0 before 4.5.0, the info endpoint may leak sensitive information upon a request by the "anonymous" user, as demonstrated by responses with a 200 HTTP status code and a JSON object containing IP address strings. This is related to a missing access-control check in bin/defaults/script/info/login.js.
Affected products
2cpe:2.3:a:openidm_project:openidm:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:openidm_project:openidm:*:*:*:*:*:*:*:*range: <=4.0.0
- cpe:2.3:a:openidm_project:openidm:4.5.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.rootlabs.com.br/information-disclosure-forgerock-openidm-4-0-0-and-4-5-0/nvdExploitThird Party Advisory
- backstage.forgerock.com/knowledge/kb/article/a92936505nvdMitigationThird Party Advisory
News mentions
0No linked articles in our index yet.