Описание
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
Ссылки
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Issue Tracking
- Issue TrackingPatchThird Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Issue Tracking
- Issue TrackingPatchThird Party Advisory
Уязвимые конфигурации
Одно из
EPSS
7.5 High
CVSS2
Дефекты
Связанные уязвимости
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
The default configuration of the ObjectRepresentation class in Restlet ...
Restlet Arbitrary Java Code Execution via a serialized object
EPSS
7.5 High
CVSS2