ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
https://www.trellix.com/blogs/research/scattered-spider-the-modus-operandi/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a
https://backstage.forgerock.com/knowledge/kb/article/a47894244
http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html