The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
Weaknesses in this category are typically introduced during the configuration of the software.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-1862.html | third party advisory vendor advisory |
http://restlet.org/learn/2.1/changes | release notes vendor advisory |
http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=995275 | issue tracking third party advisory |
https://github.com/restlet/restlet-framework-java/issues/774 | issue tracking patch |
http://rhn.redhat.com/errata/RHSA-2013-1410.html | third party advisory vendor advisory |