The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| Hyperlink | Source | Resource |
|---|---|---|
| http://restlet.org/learn/2.1/changes | secalert@redhat.com | Vendor Advisory |
| http://rhn.redhat.com/errata/RHSA-2013-1410.html | secalert@redhat.com | Third Party Advisory |
| http://rhn.redhat.com/errata/RHSA-2013-1862.html | secalert@redhat.com | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=999735 | secalert@redhat.com | Issue Tracking |
| https://github.com/restlet/restlet-framework-java/issues/778 | secalert@redhat.com | Issue Tracking Patch Third Party Advisory |
| http://restlet.org/learn/2.1/changes | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| http://rhn.redhat.com/errata/RHSA-2013-1410.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| http://rhn.redhat.com/errata/RHSA-2013-1862.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=999735 | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking |
| https://github.com/restlet/restlet-framework-java/issues/778 | af854a3a-2127-422b-91ae-364da2661108 | Issue Tracking Patch Third Party Advisory |