It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services.
https://backstage.forgerock.com/knowledge/kb/article/a90639318
https://backstage.forgerock.com/downloads/browse/am/featured