Lucene search

K
githubGitHub Advisory DatabaseGHSA-92J2-5R7P-6HJW
HistoryMay 17, 2022 - 3:28 a.m.

Restlet is vulnerable to Arbitrary Java Code Execution via crafted XML

2022-05-1703:28:12
CWE-91
GitHub Advisory Database
github.com
12

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.8%

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

Affected configurations

Vulners
Node
org.restlet.jse\Matchorg.restlet
CPENameOperatorVersion
org.restlet.jse:org.restletlt2.1.4

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.017 Low

EPSS

Percentile

87.8%