First published: Mon Oct 15 2018(Updated: )
Red Hat JBoss RichFaces Framework contains an expression language injection vulnerability via the UserResource resource. A remote, unauthenticated attacker could exploit this vulnerability to execute malicious code using a chain of Java serialized objects via org.ajax4jsf.resource.UserResource$UriData.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.richfaces:richfaces-core | <3.3.4 | 3.3.4 |
Red Hat JBoss RichFaces Framework | ||
Redhat Richfaces | >=3.1.0<=3.3.4 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
redhat RichFaces | >=3.1.0<=3.3.4 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14667 has been classified with a medium severity rating due to its potential to allow remote code execution.
To remediate CVE-2018-14667, upgrade JBoss RichFaces Framework to version 3.3.4 or later.
CVE-2018-14667 affects users of Red Hat JBoss RichFaces Framework versions prior to 3.3.4.
CVE-2018-14667 is an expression language injection vulnerability that can be exploited to execute malicious code.
Yes, CVE-2018-14667 can be exploited by remote, unauthenticated attackers.