7.5

CVE-2013-4221

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RestletRestlet Version <= 2.1.3
RestletRestlet Version2.1 Updatemilestone1
RestletRestlet Version2.1 Updatemilestone2
RestletRestlet Version2.1 Updatemilestone3
RestletRestlet Version2.1 Updatemilestone4
RestletRestlet Version2.1 Updatemilestone5
RestletRestlet Version2.1 Updatemilestone6
RestletRestlet Version2.1 Updaterc1
RestletRestlet Version2.1 Updaterc2
RestletRestlet Version2.1 Updaterc3
RestletRestlet Version2.1 Updaterc4
RestletRestlet Version2.1 Updaterc5
RestletRestlet Version2.1 Updaterc6
RestletRestlet Version2.1.0
RestletRestlet Version2.1.1
RestletRestlet Version2.1.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.11% 0.837
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-91 XML Injection (aka Blind XPath Injection)

The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.