Description
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
Remediation
References
http://restlet.org/learn/2.1/changes
http://rhn.redhat.com/errata/RHSA-2013-1410.html
http://rhn.redhat.com/errata/RHSA-2013-1862.html
https://bugzilla.redhat.com/show_bug.cgi?id=999735
https://github.com/restlet/restlet-framework-java/issues/778
Related Vulnerabilities
CVE-2018-5382 Vulnerability in maven package org.bouncycastle:bcprov-jdk15
CVE-2015-3192 Vulnerability in maven package org.springframework:spring-web
CVE-2022-45921 Vulnerability in maven package io.fusionauth:fusionauth-java-client
CVE-2022-41253 Vulnerability in maven package org.jenkins-ci.plugins:cons3rt
CVE-2022-45935 Vulnerability in maven package org.apache.james:james-server-core