Description
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3272 | The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML. |
Github GHSA |
GHSA-92j2-5r7p-6hjw | Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T16:38:01.958Z
Reserved: 2013-06-12T00:00:00.000Z
Link: CVE-2013-4221
No data.
Status : Deferred
Published: 2013-10-10T00:55:14.850
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-4221
OpenCVE Enrichment
No data.
EUVD
Github GHSA