CVE-2018-12533

critical

Description

JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.

References

https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html

https://access.redhat.com/errata/RHSA-2018:2930

https://access.redhat.com/errata/RHSA-2018:2664

https://access.redhat.com/errata/RHSA-2018:2663

http://www.securitytracker.com/id/1041617

http://www.securityfocus.com/bid/104502

http://seclists.org/fulldisclosure/2020/Mar/21

Details

Source: Mitre, NVD

Published: 2018-06-18

Updated: 2020-08-24

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical