The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3272 | The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML. |
Github GHSA |
GHSA-92j2-5r7p-6hjw | Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T16:38:01.958Z
Reserved: 2013-06-12T00:00:00
Link: CVE-2013-4221
No data.
Status : Deferred
Published: 2013-10-10T00:55:14.850
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-4221
OpenCVE Enrichment
No data.
EUVD
Github GHSA