Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: openambit

Found 1 matching suggestions

View:
Compact
Detailed
created 1 week, 1 day ago
Pre-Authentication Remote Code Execution via `jato.clientSession` Deserialization in OpenAM

Open Access Management (OpenAM) is an access management solution. Prior to 16.0.6, OpenIdentityPlatform OpenAM is vulnerable to pre-authentication Remote Code Execution (RCE) via unsafe Java deserialization of the jato.clientSession HTTP parameter. This bypasses the WhitelistObjectInputStream mitigation that was applied to the jato.pageSession parameter after CVE-2021-35464. An unauthenticated attacker can achieve arbitrary command execution on the server by sending a crafted serialized Java object as the jato.clientSession GET/POST parameter to any JATO ViewBean endpoint whose JSP contains <jato:form> tags (e.g., the Password Reset pages). This vulnerability is fixed in 16.0.6.

Affected products

OpenAM
  • ==< 16.0.6

Matching in nixpkgs

pkgs.openambit

Helps fetch data from Suunto Ambit GPS watches

  • nixos-unstable 0.5
    • nixpkgs-unstable 0.5
    • nixos-unstable-small 0.5
  • nixos-25.11 0.5
    • nixos-25.11-small 0.5
    • nixpkgs-25.11-darwin 0.5

Package maintainers