Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4221

Опубликовано: 07 авг. 2013
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Web Server 1restletUnder investigation
Fuse ESB Enterprise 7.1.0FixedRHSA-2013:186219.12.2013
Fuse Management Console 7.1.0FixedRHSA-2013:186219.12.2013
Fuse MQ Enterprise 7.1.0FixedRHSA-2013:186219.12.2013
Red Hat JBoss A-MQ 6.0FixedRHSA-2013:141007.10.2013
Red Hat JBoss Fuse 6.0FixedRHSA-2013:141007.10.2013

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=995275Restlet: remote code execution due to insecure XML deserialization

EPSS

Процентиль: 80%
0.01452
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

nvd
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

debian
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet ...

github
больше 3 лет назад

Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML

EPSS

Процентиль: 80%
0.01452
Низкий

6.8 Medium

CVSS2