7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
restlet is vulnerable to arbitrary code execution. A remote attacker is able to execute arbitrary Java code using a malicious serialized object due to the default configuration of the ObjectRepresentation
class which performs deserialization of objects from untrusted sources. This is a different vulnerability from CVE-2013-4221.
CPE | Name | Operator | Version |
---|---|---|---|
restlet core api and engine | le | 2.1.3 | |
restlet core api and engine | le | 2.1.3 |