Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4271

Опубликовано: 07 сент. 2013
Источник: redhat
CVSS2: 7.5
EPSS Низкий

Описание

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Web Server 1restletUnder investigation
Fuse ESB Enterprise 7.1.0FixedRHSA-2013:186219.12.2013
Fuse Management Console 7.1.0FixedRHSA-2013:186219.12.2013
Fuse MQ Enterprise 7.1.0FixedRHSA-2013:186219.12.2013
Red Hat JBoss A-MQ 6.0FixedRHSA-2013:141007.10.2013
Red Hat JBoss Fuse 6.0FixedRHSA-2013:141007.10.2013

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=999735Restlet: remote code execution due to insecure deserialization

EPSS

Процентиль: 65%
0.00486
Низкий

7.5 High

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.

nvd
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.

debian
больше 12 лет назад

The default configuration of the ObjectRepresentation class in Restlet ...

github
больше 3 лет назад

Restlet Arbitrary Java Code Execution via a serialized object

EPSS

Процентиль: 65%
0.00486
Низкий

7.5 High

CVSS2