First published: Wed Jun 12 2013(Updated: )
A flaw was found in the way JBoss RichFaces handled deserialization. A remote attacker could use this flaw to trigger the execution of the deserialization methods in any serializable class deployed on the server. This could lead to a variety of security impacts depending on the deserialization logic of these classes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat jboss enterprise application platform | =4.3.0 | |
redhat jboss enterprise application platform | =4.3.0-cp10 | |
redhat jboss enterprise application platform | =5.0.0 | |
redhat jboss enterprise application platform | =5.0.1 | |
redhat jboss enterprise application platform | =5.1.0 | |
redhat jboss enterprise application platform | =5.1.1 | |
redhat jboss enterprise application platform | =5.1.2 | |
redhat jboss enterprise application platform | =5.2.0 | |
Red Hat JBoss Enterprise BRMS Platform | =5.0.0 | |
Red Hat JBoss Enterprise BRMS Platform | =5.0.1 | |
Red Hat JBoss Enterprise BRMS Platform | =5.0.2 | |
Red Hat JBoss Enterprise BRMS Platform | =5.1.0 | |
Red Hat JBoss Enterprise BRMS Platform | =5.2.0 | |
Red Hat JBoss Enterprise BRMS Platform | =5.3.0 | |
Red Hat JBoss Enterprise BRMS Platform | =5.3.1 | |
Red Hat JBoss Portal | =4.3.0-cp03 | |
Red Hat JBoss Portal | =4.3.0-cp04 | |
Red Hat JBoss Portal | =4.3.0-cp05 | |
Red Hat JBoss Portal | =4.3.0-cp06 | |
Red Hat JBoss Portal | =4.3.0-cp07 | |
Red Hat JBoss Portal | =5.0.0 | |
Red Hat JBoss Portal | =5.0.1 | |
Red Hat JBoss Portal | =5.1.0 | |
Red Hat JBoss Portal | =5.1.1 | |
Red Hat JBoss Portal | =5.2.0 | |
Red Hat JBoss Portal | =5.2.1 | |
Red Hat JBoss Portal | =5.2.2 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp01 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp02 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp03 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp04 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp05 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-tp02 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp01 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp02 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp03 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp04 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp05 | |
Red Hat JBoss Enterprise SOA Platform | =5.0.0 | |
Red Hat JBoss Enterprise SOA Platform | =5.0.1 | |
Red Hat JBoss Enterprise SOA Platform | =5.0.2 | |
Red Hat JBoss Enterprise SOA Platform | =5.1.0 | |
Red Hat JBoss Enterprise SOA Platform | =5.1.1 | |
Red Hat JBoss Enterprise SOA Platform | =5.2.0 | |
Red Hat JBoss Enterprise SOA Platform | =5.3.0 | |
Red Hat JBoss Enterprise SOA Platform | =5.3.1 | |
Red Hat JBoss Enterprise Web Platform | =5.1.0 | |
Red Hat JBoss Enterprise Web Platform | =5.1.1 | |
Red Hat JBoss Enterprise Web Platform | =5.1.2 | |
Red Hat JBoss Enterprise Web Platform | =5.2.0 | |
redhat jboss operations network | =1.0.0 | |
redhat jboss operations network | =2.0.0 | |
redhat jboss operations network | =2.0.1 | |
redhat jboss operations network | =2.1.0 | |
redhat jboss operations network | =2.2 | |
redhat jboss operations network | =2.3 | |
redhat jboss operations network | =2.3.1 | |
redhat jboss operations network | =2.4 | |
redhat jboss operations network | =2.4.1 | |
redhat jboss operations network | =2.4.2 | |
redhat jboss operations network | =3.0 | |
redhat jboss operations network | =3.0.1 | |
redhat jboss operations network | =3.1 | |
redhat jboss operations network | =3.1.1 | |
redhat jboss operations network | =3.1.2 | |
Red Hat JBoss Web Framework Kit | <=2.2.0 | |
Red Hat JBoss Web Framework Kit | =1.0.0 | |
Red Hat JBoss Web Framework Kit | =1.1.0 | |
Red Hat JBoss Web Framework Kit | =1.2.0 | |
Red Hat JBoss Web Framework Kit | =2.0.0 | |
Red Hat JBoss Web Framework Kit | =2.1.0 | |
redhat RichFaces | =3.1.0 | |
redhat RichFaces | =3.1.1 | |
redhat RichFaces | =3.1.2 | |
redhat RichFaces | =3.1.3 | |
redhat RichFaces | =3.1.4 | |
redhat RichFaces | =3.1.5 | |
redhat RichFaces | =3.1.6 | |
redhat RichFaces | =3.2.0 | |
redhat RichFaces | =3.2.0-sr1 | |
redhat RichFaces | =3.2.1 | |
redhat RichFaces | =3.2.2 | |
redhat RichFaces | =3.3.0 | |
redhat RichFaces | =3.3.1 | |
redhat RichFaces | =3.3.2 | |
redhat RichFaces | =3.3.2-sr1 | |
redhat RichFaces | =3.3.3 | |
redhat RichFaces | =4.0.0 | |
redhat RichFaces | =4.1.0 | |
redhat RichFaces | =4.2.0 | |
redhat RichFaces | =4.2.1 | |
redhat RichFaces | =4.2.2 | |
redhat RichFaces | =4.2.3 | |
redhat RichFaces | =4.3.0 | |
redhat RichFaces | =4.3.1 | |
redhat RichFaces | =4.5.0-alpha1 | |
redhat RichFaces | =5.0.0-alpha1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2165 is classified as a high severity vulnerability due to the potential for arbitrary code execution through unsafe deserialization.
Fix CVE-2013-2165 by upgrading to an updated version of JBoss RichFaces or applying any available security patches from Red Hat.
CVE-2013-2165 can allow remote attackers to execute arbitrary code on the server due to flaws in deserialization.
CVE-2013-2165 affects various versions of Red Hat JBoss Enterprise Application Platform, BRMS Platform, SOA Platform, and RichFaces.
As of the last updates, there have been reports indicating that CVE-2013-2165 may be targeted in various attacks, making prompt remediation essential.