First published: Mon Oct 15 2018(Updated: )
Red Hat JBoss RichFaces Framework contains an expression language injection vulnerability via the UserResource resource. A remote, unauthenticated attacker could exploit this vulnerability to execute malicious code using a chain of Java serialized objects via org.ajax4jsf.resource.UserResource$UriData.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.richfaces:richfaces-core | <3.3.4 | 3.3.4 |
Redhat Richfaces | >=3.1.0<=3.3.4 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux | =6.0 | |
Red Hat JBoss RichFaces Framework | ||
>=3.1.0<=3.3.4 | ||
=5.0 | ||
=6.0 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.