Description
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
Remediation
References
http://seclists.org/fulldisclosure/2020/Mar/21
http://www.securityfocus.com/bid/104502
http://www.securitytracker.com/id/1041617
https://access.redhat.com/errata/RHSA-2018:2663
https://access.redhat.com/errata/RHSA-2018:2664
https://access.redhat.com/errata/RHSA-2018:2930
https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html
Related Vulnerabilities
CVE-2019-6286 Vulnerability in maven package org.webjars.npm:node-sass
CVE-2017-12617 Vulnerability in maven package org.apache.tomcat:catalina
CVE-2021-44145 Vulnerability in maven package org.apache.nifi:nifi
CVE-2019-10296 Vulnerability in maven package com.urbancode.ds.jenkins.plugins:sra-deploy
CVE-2022-28154 Vulnerability in maven package org.jenkins-ci.plugins:covcomplplot