Red.Hat.JBoss.RichFaces.Arbitrary.Java.Deserialization
Description
This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in JBoss RichFaces.
This vulnerability is due to insufficient validation of HTTP requests. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to a vulnerable server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.
Affected Products
RichFaces 3.x through 5.x implementation in Red Hat JBoss Web Framework Kit before 2.3.0
Red Hat JBoss Enterprise Web Platform 5 EL6
Red Hat JBoss Enterprise Web Platform 5 EL5
Red Hat JBoss Enterprise Web Platform 5 EL4
Red Hat JBoss Enterprise Application Platform 4.3 EL5
Red Hat JBoss Enterprise Application Platform 4.3 EL4
Red Hat JBoss Enterprise Application Platform 5 EL6
Red Hat JBoss Enterprise Application Platform 5 EL5
Red Hat JBoss Enterprise Application Platform 5 EL4
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://access.redhat.com/security/cve/CVE-2013-2165
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |