CVE Vulnerabilities

CVE-2013-4521

Deserialization of Untrusted Data

Published: Feb 06, 2020 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.

Weakness

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

Affected Software

NameVendorStart VersionEnd Version
NuxeoNuxeo5.6.0 (including)5.6.0 (including)
NuxeoNuxeo5.6.0-hotfix01 (including)5.6.0-hotfix01 (including)
NuxeoNuxeo5.6.0-hotfix02 (including)5.6.0-hotfix02 (including)
NuxeoNuxeo5.6.0-hotfix03 (including)5.6.0-hotfix03 (including)
NuxeoNuxeo5.6.0-hotfix04 (including)5.6.0-hotfix04 (including)
NuxeoNuxeo5.6.0-hotfix05 (including)5.6.0-hotfix05 (including)
NuxeoNuxeo5.6.0-hotfix06 (including)5.6.0-hotfix06 (including)
NuxeoNuxeo5.6.0-hotfix07 (including)5.6.0-hotfix07 (including)
NuxeoNuxeo5.6.0-hotfix08 (including)5.6.0-hotfix08 (including)
NuxeoNuxeo5.6.0-hotfix09 (including)5.6.0-hotfix09 (including)
NuxeoNuxeo5.6.0-hotfix10 (including)5.6.0-hotfix10 (including)
NuxeoNuxeo5.6.0-hotfix11 (including)5.6.0-hotfix11 (including)
NuxeoNuxeo5.6.0-hotfix12 (including)5.6.0-hotfix12 (including)
NuxeoNuxeo5.6.0-hotfix13 (including)5.6.0-hotfix13 (including)
NuxeoNuxeo5.6.0-hotfix14 (including)5.6.0-hotfix14 (including)
NuxeoNuxeo5.6.0-hotfix15 (including)5.6.0-hotfix15 (including)
NuxeoNuxeo5.6.0-hotfix16 (including)5.6.0-hotfix16 (including)
NuxeoNuxeo5.6.0-hotfix17 (including)5.6.0-hotfix17 (including)
NuxeoNuxeo5.6.0-hotfix18 (including)5.6.0-hotfix18 (including)
NuxeoNuxeo5.6.0-hotfix19 (including)5.6.0-hotfix19 (including)
NuxeoNuxeo5.6.0-hotfix20 (including)5.6.0-hotfix20 (including)
NuxeoNuxeo5.6.0-hotfix21 (including)5.6.0-hotfix21 (including)
NuxeoNuxeo5.6.0-hotfix22 (including)5.6.0-hotfix22 (including)
NuxeoNuxeo5.6.0-hotfix23 (including)5.6.0-hotfix23 (including)
NuxeoNuxeo5.6.0-hotfix24 (including)5.6.0-hotfix24 (including)
NuxeoNuxeo5.6.0-hotfix25 (including)5.6.0-hotfix25 (including)
NuxeoNuxeo5.6.0-hotfix26 (including)5.6.0-hotfix26 (including)
NuxeoNuxeo5.8.0 (including)5.8.0 (including)

Potential Mitigations

  • Make fields transient to protect them from deserialization.
  • An attempt to serialize and then deserialize a class containing transient fields will result in NULLs where the transient data should be. This is an excellent way to prevent time, environment-based, or sensitive variables from being carried over and used improperly.

References