CVE-2013-4271
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
10/10/2013
Last modified:
11/04/2025
Description
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:restlet:restlet:*:*:*:*:*:*:*:* | 2.1.3 (including) | |
| cpe:2.3:a:restlet:restlet:2.1:milestone1:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:milestone2:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:milestone3:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:milestone4:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:milestone5:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:milestone6:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:rc5:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1:rc6:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:restlet:restlet:2.1.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://restlet.org/learn/2.1/changes
- http://rhn.redhat.com/errata/RHSA-2013-1410.html
- http://rhn.redhat.com/errata/RHSA-2013-1862.html
- https://bugzilla.redhat.com/show_bug.cgi?id=999735
- https://github.com/restlet/restlet-framework-java/issues/778
- http://restlet.org/learn/2.1/changes
- http://rhn.redhat.com/errata/RHSA-2013-1410.html
- http://rhn.redhat.com/errata/RHSA-2013-1862.html
- https://bugzilla.redhat.com/show_bug.cgi?id=999735
- https://github.com/restlet/restlet-framework-java/issues/778



