Vulnerability Details CVE-2013-4221
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.015
EPSS Ranking 79.7%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2013-4221
-
cpe:2.3:a:restlet:restlet:1.0.0
-
cpe:2.3:a:restlet:restlet:1.0.1
-
cpe:2.3:a:restlet:restlet:1.01
-
cpe:2.3:a:restlet:restlet:1.2
-
cpe:2.3:a:restlet:restlet:2.0
-
cpe:2.3:a:restlet:restlet:2.0.11
-
cpe:2.3:a:restlet:restlet:2.0.12
-
cpe:2.3:a:restlet:restlet:2.0.13
-
cpe:2.3:a:restlet:restlet:2.0.14
-
cpe:2.3:a:restlet:restlet:2.0.15
-
cpe:2.3:a:restlet:restlet:2.1
-
cpe:2.3:a:restlet:restlet:2.1.0
-
cpe:2.3:a:restlet:restlet:2.1.1
-
cpe:2.3:a:restlet:restlet:2.1.2
-
cpe:2.3:a:restlet:restlet:2.1.3