Description
ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data.
Remediation
References
http://jvn.jp/en/jp/JVN38787103/index.html
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000072
http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html
http://rhn.redhat.com/errata/RHSA-2013-1041.html
http://rhn.redhat.com/errata/RHSA-2013-1042.html
http://rhn.redhat.com/errata/RHSA-2013-1043.html
http://rhn.redhat.com/errata/RHSA-2013-1044.html
http://rhn.redhat.com/errata/RHSA-2013-1045.html
http://seclists.org/fulldisclosure/2020/Mar/21
https://access.redhat.com/security/cve/CVE-2013-2165
https://bugzilla.redhat.com/show_bug.cgi?id=973570
Related Vulnerabilities
CVE-2023-25765 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2020-4077 Vulnerability in npm package electron
CVE-2016-6796 Vulnerability in maven package org.apache.tomcat:tomcat-jasper
CVE-2016-2510 Vulnerability in maven package org.beanshell:bsh
CVE-2019-9518 Vulnerability in maven package io.netty:netty-codec-http2