JBoss RichFaces 4.5.3 through 4.5.17 allows unauthenticated remote attackers to inject an arbitrary expression language (EL) variable mapper and execute arbitrary Java code via a MediaOutputResource's resource request, aka RF-14309.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/Mar/21 | |
http://www.securityfocus.com/bid/104503 | Third Party Advisory VDB Entry |
https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Mar/21 | |
http://www.securityfocus.com/bid/104503 | Third Party Advisory VDB Entry |
https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2020/Mar/21 - | |
References | () http://www.securityfocus.com/bid/104503 - Third Party Advisory, VDB Entry | |
References | () https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html - Exploit, Third Party Advisory |
Information
Published : 2018-06-18 12:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12532
Mitre link : CVE-2018-12532
CVE.ORG link : CVE-2018-12532
JSON object : View
Products Affected
redhat
- richfaces
CWE
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')