JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:2664 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1041617 | third party advisory vdb entry |
https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html | third party advisory |
https://access.redhat.com/errata/RHSA-2018:2663 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/104502 | third party advisory vdb entry |
https://access.redhat.com/errata/RHSA-2018:2930 | third party advisory vendor advisory |
http://seclists.org/fulldisclosure/2020/Mar/21 | mailing list |