CVE-2013-4221 – org.restlet.jse:org.restlet
Package
Manager: maven
Name: org.restlet.jse:org.restlet
Vulnerable Version: >=0 <2.1.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.01452 pctl0.80053
Details
Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
Metadata
Created: 2022-05-17T03:28:12Z
Modified: 2024-03-05T17:30:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-92j2-5r7p-6hjw/GHSA-92j2-5r7p-6hjw.json
CWE IDs: ["CWE-91"]
Alternative ID: GHSA-92j2-5r7p-6hjw
Finding: F083
Auto approve: 1