CVE-2013-4271

EUVD-2022-3676
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
Affected Products (NVD)
VendorProductVersion
restletrestlet
𝑥
≤ 2.1.3
restletrestlet
2.1:milestone1
restletrestlet
2.1:milestone2
restletrestlet
2.1:milestone3
restletrestlet
2.1:milestone4
restletrestlet
2.1:milestone5
restletrestlet
2.1:milestone6
restletrestlet
2.1:rc1
restletrestlet
2.1:rc2
restletrestlet
2.1:rc3
restletrestlet
2.1:rc4
restletrestlet
2.1:rc5
restletrestlet
2.1:rc6
restletrestlet
2.1.0
restletrestlet
2.1.1
restletrestlet
2.1.2
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
restlet
artful
ignored
bionic
needed
cosmic
ignored
disco
dne
eoan
dne
focal
dne
groovy
dne
hirsute
dne
impish
dne
jammy
dne
kinetic
dne
lucid
dne
lunar
dne
mantic
dne
noble
dne
precise
dne
quantal
ignored
raring
ignored
saucy
ignored
trusty
dne
utopic
ignored
vivid
ignored
wily
ignored
xenial
needed
yakkety
ignored
zesty
ignored