Описание
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
Ссылки
- Third Party Advisory
- Release NotesVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingPatch
- Third Party Advisory
- Release NotesVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingPatch
Уязвимые конфигурации
Одно из
EPSS
7.5 High
CVSS2
Дефекты
Связанные уязвимости
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
The default configuration of the ObjectRepresentation class in Restlet ...
Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML
EPSS
7.5 High
CVSS2