JBoss RichFaces 4.5.3 through 4.5.17 allows unauthenticated remote attackers to inject an arbitrary expression language (EL) variable mapper and execute arbitrary Java code via a MediaOutputResource's resource request, aka RF-14309.
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/104503 | third party advisory vdb entry |
https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html | third party advisory exploit |
http://seclists.org/fulldisclosure/2020/Mar/21 | mailing list |