Description
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
Published: 2018-06-18
Score: 9.8 Critical
EPSS: 75.5% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4j38-wjhf-884r Arbitrary code execution in Richfaces
History

No history.

Subscriptions

Redhat Jboss Enterprise Application Platform Jboss Operations Network Richfaces
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:38:06.257Z

Reserved: 2018-06-18T00:00:00.000Z

Link: CVE-2018-12533

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-18T12:29:00.280

Modified: 2024-11-21T03:45:22.980

Link: CVE-2018-12533

cve-icon Redhat

Severity : Critical

Publid Date: 2018-05-30T00:00:00Z

Links: CVE-2018-12533 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses