restlet is vulnerable to arbitrary code execution. A remote attacker is able to execute arbitrary Java code using a malicious serialized object due to the default configuration of the ObjectRepresentation
class which performs deserialization of objects from untrusted sources. This is a different vulnerability from CVE-2013-4221.
CPE | Name | Operator | Version |
---|---|---|---|
restlet core api and engine | le | 2.1.3 | |
restlet core api and engine | le | 2.1.3 |