7.5

CVE-2013-4271

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RestletRestlet Version <= 2.1.3
RestletRestlet Version2.1 Updatemilestone1
RestletRestlet Version2.1 Updatemilestone2
RestletRestlet Version2.1 Updatemilestone3
RestletRestlet Version2.1 Updatemilestone4
RestletRestlet Version2.1 Updatemilestone5
RestletRestlet Version2.1 Updatemilestone6
RestletRestlet Version2.1 Updaterc1
RestletRestlet Version2.1 Updaterc2
RestletRestlet Version2.1 Updaterc3
RestletRestlet Version2.1 Updaterc4
RestletRestlet Version2.1 Updaterc5
RestletRestlet Version2.1 Updaterc6
RestletRestlet Version2.1.0
RestletRestlet Version2.1.1
RestletRestlet Version2.1.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.49% 0.648
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.