Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f3mv-g3xr-fp7w

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

Restlet Arbitrary Java Code Execution via a serialized object

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.

Пакеты

Наименование

org.restlet.jse:org.restlet

maven
Затронутые версииВерсия исправления

< 2.1.4

2.1.4

EPSS

Процентиль: 65%
0.00497
Низкий

Дефекты

CWE-502

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.

redhat
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.

nvd
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.

debian
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet ...

EPSS

Процентиль: 65%
0.00497
Низкий

Дефекты

CWE-502