CVE-2013-2165

ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp10:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp03:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp04:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp05:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp06:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:cp07:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_portal_platform:5.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp01:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp02:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp03:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp04:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp05:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:tp02:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp01:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp02:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp03:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp04:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp05:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_framework_kit:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.2.0:sr1:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.2:sr1:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:4.5.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:redhat:richfaces:5.0.0:alpha1:*:*:*:*:*:*

History

13 Feb 2023, 00:28

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2013:1044', 'name': 'https://access.redhat.com/errata/RHSA-2013:1044', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2013:1041', 'name': 'https://access.redhat.com/errata/RHSA-2013:1041', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2013:1042', 'name': 'https://access.redhat.com/errata/RHSA-2013:1042', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2013:1043', 'name': 'https://access.redhat.com/errata/RHSA-2013:1043', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2013:1045', 'name': 'https://access.redhat.com/errata/RHSA-2013:1045', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2013-2165 JBoss RichFaces: Remote code execution due to insecure deserialization ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data.

02 Feb 2023, 16:15

Type Values Removed Values Added
Summary ResourceBuilderImpl.java in the RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0, Red Hat JBoss Web Platform through 5.2.0, Red Hat JBoss Enterprise Application Platform through 4.3.0 CP10 and 5.x through 5.2.0, Red Hat JBoss BRMS through 5.3.1, Red Hat JBoss SOA Platform through 4.3.0 CP05 and 5.x through 5.3.1, Red Hat JBoss Portal through 4.3 CP07 and 5.x through 5.2.2, and Red Hat JBoss Operations Network through 2.4.2 and 3.x through 3.1.2 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. CVE-2013-2165 JBoss RichFaces: Remote code execution due to insecure deserialization
References
  • (MISC) https://access.redhat.com/errata/RHSA-2013:1044 -
  • (MISC) https://access.redhat.com/errata/RHSA-2013:1041 -
  • (MISC) https://access.redhat.com/errata/RHSA-2013:1042 -
  • (MISC) https://access.redhat.com/errata/RHSA-2013:1043 -
  • (MISC) https://access.redhat.com/errata/RHSA-2013:1045 -

Information

Published : 2013-07-23 11:03

Updated : 2023-12-10 11:16


NVD link : CVE-2013-2165

Mitre link : CVE-2013-2165

CVE.ORG link : CVE-2013-2165


JSON object : View

Products Affected

redhat

  • richfaces
  • jboss_enterprise_portal_platform
  • jboss_enterprise_brms_platform
  • jboss_enterprise_application_platform
  • jboss_enterprise_web_platform
  • jboss_web_framework_kit
  • jboss_operations_network
  • jboss_enterprise_soa_platform
CWE
CWE-264

Permissions, Privileges, and Access Controls