Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4221

Опубликовано: 10 окт. 2013
Источник: debian
EPSS Низкий

Описание

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
restletitppackage

Примечания

  • http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html

  • https://github.com/o2platform/DefCon_RESTing

EPSS

Процентиль: 84%
0.02112
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

redhat
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

nvd
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

github
больше 3 лет назад

Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML

EPSS

Процентиль: 84%
0.02112
Низкий