CVE-2013-2165

ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data.
References
Link Resource
http://jvn.jp/en/jp/JVN38787103/index.html Third Party Advisory VDB Entry
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000072 Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html
http://rhn.redhat.com/errata/RHSA-2013-1041.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1042.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1043.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1044.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1045.html Vendor Advisory
http://seclists.org/fulldisclosure/2020/Mar/21
https://access.redhat.com/security/cve/CVE-2013-2165 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=973570 Issue Tracking Vendor Advisory
http://jvn.jp/en/jp/JVN38787103/index.html Third Party Advisory VDB Entry
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000072 Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html
http://rhn.redhat.com/errata/RHSA-2013-1041.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1042.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1043.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1044.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1045.html Vendor Advisory
http://seclists.org/fulldisclosure/2020/Mar/21
https://access.redhat.com/security/cve/CVE-2013-2165 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=973570 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp10:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp03:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp04:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp05:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp06:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp07:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp01:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp02:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp03:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp04:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp05:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:tp02:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp01:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp02:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp03:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp04:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp05:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.2.0:sr1:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.2:sr1:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.5.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:5.0.0:alpha1:*:*:*:*:*:*

History

21 Nov 2024, 01:51

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN38787103/index.html - Third Party Advisory, VDB Entry () http://jvn.jp/en/jp/JVN38787103/index.html - Third Party Advisory, VDB Entry
References () http://jvndb.jvn.jp/jvndb/JVNDB-2013-000072 - Third Party Advisory, VDB Entry () http://jvndb.jvn.jp/jvndb/JVNDB-2013-000072 - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html - () http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1041.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-1041.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-1042.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-1042.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-1043.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-1043.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-1044.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-1044.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-1045.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2013-1045.html - Vendor Advisory
References () http://seclists.org/fulldisclosure/2020/Mar/21 - () http://seclists.org/fulldisclosure/2020/Mar/21 -
References () https://access.redhat.com/security/cve/CVE-2013-2165 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2013-2165 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=973570 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=973570 - Issue Tracking, Vendor Advisory

Information

Published : 2013-07-23 11:03

Updated : 2024-11-21 01:51


NVD link : CVE-2013-2165

Mitre link : CVE-2013-2165

CVE.ORG link : CVE-2013-2165


JSON object : View

Products Affected

redhat

  • richfaces
  • jboss_operations_network
  • jboss_enterprise_portal_platform
  • jboss_web_framework_kit
  • jboss_enterprise_application_platform
  • jboss_enterprise_web_platform
  • jboss_enterprise_brms_platform
  • jboss_enterprise_soa_platform
CWE
CWE-264

Permissions, Privileges, and Access Controls