Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:restlet:restlet:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FF36E47-FB83-4EE2-A8AD-4CCB150FA05E", "versionEndIncluding": "2.1.3", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:milestone1:*:*:*:*:*:*", "matchCriteriaId": "000B0109-CDC6-4CF0-8A90-F97D98BFB954", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:milestone2:*:*:*:*:*:*", "matchCriteriaId": "F745EEF2-7E39-414C-847F-38A276E799A5", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:milestone3:*:*:*:*:*:*", "matchCriteriaId": "CFC3C0BC-612C-495D-8AD6-F439229F89FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:milestone4:*:*:*:*:*:*", "matchCriteriaId": "11E97321-A10F-418C-B6C1-DD1AD6206E36", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:milestone5:*:*:*:*:*:*", "matchCriteriaId": "A44C440F-E99C-46DF-9168-1A858157F4F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:milestone6:*:*:*:*:*:*", "matchCriteriaId": "D4E467B9-1379-4270-8AFB-D316E27231AD", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "7A3D4845-EE2D-4CB5-B1F2-F49C9637940F", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "70F9C4B9-9938-43A4-8742-43DB3AD209D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "B157880F-B6BF-46F4-92A5-93BC4DBDACD1", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:rc4:*:*:*:*:*:*", "matchCriteriaId": "B8E81758-0104-4AAF-90AF-DFF634EDD812", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:rc5:*:*:*:*:*:*", "matchCriteriaId": "CF001292-CD53-4BDE-BF5E-874FEF1CA18C", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1:rc6:*:*:*:*:*:*", "matchCriteriaId": "6C7A833C-C531-4869-8E65-2C2A7F123C23", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "064F898B-82C8-423F-86CD-F5BBC9C8C3A0", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A4FEF42-787B-433D-B0EE-5BAA68AC869A", "vulnerable": true}, {"criteria": "cpe:2.3:a:restlet:restlet:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "BCD71E5D-FA56-47BC-9CD3-72A7B3CDCCDA", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221."}, {"lang": "es", "value": "La configuraci\u00f3n por defecto de la clase ObjectRepresentation en Restlet anterior a la versi\u00f3n 2.1.4 deserializa objetos de fuentes no confiables, lo que permite a atacantes remotos ejecutar c\u00f3digo Java arbitrario a trav\u00e9s de objetos serializados, una vulnerabilidad diferente a CVE-2013-4221."}], "id": "CVE-2013-4271", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-10-10T00:55:14.897", "references": [{"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://restlet.org/learn/2.1/changes"}, {"source": "secalert@redhat.com", "tags": ["Third Party Advisory"], "url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html"}, {"source": "secalert@redhat.com", "tags": ["Third Party Advisory"], "url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html"}, {"source": "secalert@redhat.com", "tags": ["Issue Tracking"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=999735"}, {"source": "secalert@redhat.com", "tags": ["Issue Tracking", "Patch", "Third Party Advisory"], "url": "https://github.com/restlet/restlet-framework-java/issues/778"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://restlet.org/learn/2.1/changes"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://rhn.redhat.com/errata/RHSA-2013-1410.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://rhn.redhat.com/errata/RHSA-2013-1862.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=999735"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Patch", "Third Party Advisory"], "url": "https://github.com/restlet/restlet-framework-java/issues/778"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-502"}], "source": "nvd@nist.gov", "type": "Primary"}]}