CVE-2013-4521 (GCVE-0-2013-4521)

Vulnerability from cvelistv5 – Published: 2020-02-06 15:43 – Updated: 2024-08-06 16:45
VLAI?
Summary
RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.
Severity ?
No CVSS data available.
CWE
  • Other
Assigner
Impacted products
Vendor Product Version
Nuxeo Nuxeo Platform Affected: 5.6.0 before HF27
Affected: 5.8.0 before HF-01
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.866Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Nuxeo Platform",
          "vendor": "Nuxeo",
          "versions": [
            {
              "status": "affected",
              "version": "5.6.0 before HF27"
            },
            {
              "status": "affected",
              "version": "5.8.0 before HF-01"
            }
          ]
        }
      ],
      "datePublic": "2013-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Other",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-06T15:43:41",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4521",
    "datePublished": "2020-02-06T15:43:41",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"42899695-FAB5-4F81-86BE-89E3089CBB36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix01:*:*:*:*:*:*\", \"matchCriteriaId\": \"43160374-78C9-41E4-9884-C78ECD42B6AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix02:*:*:*:*:*:*\", \"matchCriteriaId\": \"03A3A542-E589-441A-8A8D-B997C9E028F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix03:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4D3B6C0-EEA6-4BAE-9992-8C439204D03D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix04:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DB7EFE4-DC2D-4DA9-B194-848E2DE3A16C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix05:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4AD54AC-9115-4782-8CA1-F278C79A3C66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix06:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA1D0325-34F3-436D-A527-BFDC884E3C8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix07:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6C63873-5E2A-4FFD-9681-F2D6BE281237\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix08:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBB4C6A4-E296-4697-BBAE-A862DFAF6665\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix09:*:*:*:*:*:*\", \"matchCriteriaId\": \"71877702-48D7-4EE8-9A7C-C9CEDD63C4A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix10:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCAFE86A-E0A6-44CF-8692-BE75EDDF3700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix11:*:*:*:*:*:*\", \"matchCriteriaId\": \"74CA7501-3BC6-4227-A865-5D7B378D590A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix12:*:*:*:*:*:*\", \"matchCriteriaId\": \"726CB6C8-73BF-46D7-806E-731325D70A95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix13:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF2D5F08-5993-4900-A543-9ADE64E16755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix14:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B8F70D1-ED38-4689-8DA9-110972170438\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix15:*:*:*:*:*:*\", \"matchCriteriaId\": \"B86C501E-D555-4CAF-AC09-40A35855C218\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix16:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6978E83-F831-4EB9-B3EF-A05FF733E596\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix17:*:*:*:*:*:*\", \"matchCriteriaId\": \"22F818F2-EBFE-48BB-AE44-1F865EE1AC51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix18:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5C523C0-E03D-4E97-AAD8-86E387D95296\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix19:*:*:*:*:*:*\", \"matchCriteriaId\": \"1315D200-164D-4FB6-A46F-6F70AD7C8234\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix20:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B83B5A9-42B7-4B1C-9B58-0298B69B5568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix21:*:*:*:*:*:*\", \"matchCriteriaId\": \"07030217-791D-4EE2-AD44-B0147B88CCA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix22:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CCEFC5B-EF57-4FBC-AC4C-CBA29103A8AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix23:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E14078D-A0B5-4FC5-B713-A06FE53B38AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix24:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4BE4C3E-FC4C-4A78-A9C1-0FB4D597CA4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix25:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE2ED381-5DF4-4905-9564-7C897F7DD3A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix26:*:*:*:*:*:*\", \"matchCriteriaId\": \"8281BE24-66D7-4F72-B656-6795F6A50AB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.8.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE2E0C2C-0CE4-45F6-A2A4-85D4F21792FF\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.\"}, {\"lang\": \"es\", \"value\": \"La implementaci\\u00f3n de RichFaces en Nuxeo Platform versi\\u00f3n 5.6.0 anterior a HF27 y versi\\u00f3n 5.8.0 anterior a HF-01, no restringe las clases para las que los m\\u00e9todos de deserializaci\\u00f3n pueden ser llamados, lo que permite a atacantes remotos ejecutar c\\u00f3digo arbitrario por medio de datos serializados dise\\u00f1ados. NOTA: esta vulnerabilidad puede solaparse con CVE-2013-2165.\"}]",
      "id": "CVE-2013-4521",
      "lastModified": "2024-11-21T01:55:43.977",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2020-02-06T16:15:11.087",
      "references": "[{\"url\": \"http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1027052\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1027052\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-502\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-4521\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-02-06T16:15:11.087\",\"lastModified\":\"2024-11-21T01:55:43.977\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n de RichFaces en Nuxeo Platform versi\u00f3n 5.6.0 anterior a HF27 y versi\u00f3n 5.8.0 anterior a HF-01, no restringe las clases para las que los m\u00e9todos de deserializaci\u00f3n pueden ser llamados, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de datos serializados dise\u00f1ados. NOTA: esta vulnerabilidad puede solaparse con CVE-2013-2165.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"42899695-FAB5-4F81-86BE-89E3089CBB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix01:*:*:*:*:*:*\",\"matchCriteriaId\":\"43160374-78C9-41E4-9884-C78ECD42B6AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix02:*:*:*:*:*:*\",\"matchCriteriaId\":\"03A3A542-E589-441A-8A8D-B997C9E028F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix03:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D3B6C0-EEA6-4BAE-9992-8C439204D03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix04:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DB7EFE4-DC2D-4DA9-B194-848E2DE3A16C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix05:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AD54AC-9115-4782-8CA1-F278C79A3C66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix06:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1D0325-34F3-436D-A527-BFDC884E3C8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix07:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C63873-5E2A-4FFD-9681-F2D6BE281237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix08:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB4C6A4-E296-4697-BBAE-A862DFAF6665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix09:*:*:*:*:*:*\",\"matchCriteriaId\":\"71877702-48D7-4EE8-9A7C-C9CEDD63C4A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix10:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCAFE86A-E0A6-44CF-8692-BE75EDDF3700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix11:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CA7501-3BC6-4227-A865-5D7B378D590A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix12:*:*:*:*:*:*\",\"matchCriteriaId\":\"726CB6C8-73BF-46D7-806E-731325D70A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix13:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2D5F08-5993-4900-A543-9ADE64E16755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix14:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B8F70D1-ED38-4689-8DA9-110972170438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix15:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86C501E-D555-4CAF-AC09-40A35855C218\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix16:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6978E83-F831-4EB9-B3EF-A05FF733E596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix17:*:*:*:*:*:*\",\"matchCriteriaId\":\"22F818F2-EBFE-48BB-AE44-1F865EE1AC51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix18:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C523C0-E03D-4E97-AAD8-86E387D95296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix19:*:*:*:*:*:*\",\"matchCriteriaId\":\"1315D200-164D-4FB6-A46F-6F70AD7C8234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix20:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B83B5A9-42B7-4B1C-9B58-0298B69B5568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix21:*:*:*:*:*:*\",\"matchCriteriaId\":\"07030217-791D-4EE2-AD44-B0147B88CCA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix22:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCEFC5B-EF57-4FBC-AC4C-CBA29103A8AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix23:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E14078D-A0B5-4FC5-B713-A06FE53B38AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix24:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4BE4C3E-FC4C-4A78-A9C1-0FB4D597CA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix25:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2ED381-5DF4-4905-9564-7C897F7DD3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix26:*:*:*:*:*:*\",\"matchCriteriaId\":\"8281BE24-66D7-4F72-B656-6795F6A50AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE2E0C2C-0CE4-45F6-A2A4-85D4F21792FF\"}]}]}],\"references\":[{\"url\":\"http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1027052\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1027052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…