A flaw was found in the way JBoss RichFaces handled deserialization. A remote attacker could use this flaw to trigger the execution of the deserialization methods in any serializable class deployed on the server. This could lead to a variety of security impacts depending on the deserialization logic of these classes.
jvn.jp/en/jp/JVN38787103/index.html
jvndb.jvn.jp/jvndb/JVNDB-2013-000072
packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html
seclists.org/fulldisclosure/2020/Mar/21
access.redhat.com/security/cve/CVE-2013-2165
bugzilla.redhat.com/show_bug.cgi?id=973570
nvd.nist.gov/vuln/detail/CVE-2013-2165