Description
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4j38-wjhf-884r | Arbitrary code execution in Richfaces |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:38:06.257Z
Reserved: 2018-06-18T00:00:00.000Z
Link: CVE-2018-12533
No data.
Status : Modified
Published: 2018-06-18T12:29:00.280
Modified: 2024-11-21T03:45:22.980
Link: CVE-2018-12533
OpenCVE Enrichment
No data.
Github GHSA