CVE-2013-2165: Remote code execution due to insecure deserialization
(updated )
ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data.
References
- jvn.jp/en/jp/JVN38787103/index.html
- jvndb.jvn.jp/jvndb/JVNDB-2013-000072
- packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html
- seclists.org/fulldisclosure/2020/Mar/21
- access.redhat.com/security/cve/CVE-2013-2165
- bugzilla.redhat.com/show_bug.cgi?id=973570
- github.com/advisories/GHSA-4344-frcp-j22q
- nvd.nist.gov/vuln/detail/CVE-2013-2165
Detect and mitigate CVE-2013-2165 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →