Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-92j2-5r7p-6hjw

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

Пакеты

Наименование

org.restlet.jse:org.restlet

maven
Затронутые версииВерсия исправления

< 2.1.4

2.1.4

EPSS

Процентиль: 84%
0.02112
Низкий

Дефекты

CWE-91

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

redhat
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

nvd
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

debian
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet ...

EPSS

Процентиль: 84%
0.02112
Низкий

Дефекты

CWE-91