CVE-2013-4521 (GCVE-0-2013-4521)
Vulnerability from cvelistv5 – Published: 2020-02-06 15:43 – Updated: 2024-08-06 16:45
VLAI?
Summary
RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.
Severity ?
No CVSS data available.
CWE
- Other
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Nuxeo | Nuxeo Platform |
Affected:
5.6.0 before HF27
Affected: 5.8.0 before HF-01 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:45:14.866Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Nuxeo Platform",
"vendor": "Nuxeo",
"versions": [
{
"status": "affected",
"version": "5.6.0 before HF27"
},
{
"status": "affected",
"version": "5.8.0 before HF-01"
}
]
}
],
"datePublic": "2013-11-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Other",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-06T15:43:41",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-4521",
"datePublished": "2020-02-06T15:43:41",
"dateReserved": "2013-06-12T00:00:00",
"dateUpdated": "2024-08-06T16:45:14.866Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"42899695-FAB5-4F81-86BE-89E3089CBB36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix01:*:*:*:*:*:*\", \"matchCriteriaId\": \"43160374-78C9-41E4-9884-C78ECD42B6AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix02:*:*:*:*:*:*\", \"matchCriteriaId\": \"03A3A542-E589-441A-8A8D-B997C9E028F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix03:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4D3B6C0-EEA6-4BAE-9992-8C439204D03D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix04:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DB7EFE4-DC2D-4DA9-B194-848E2DE3A16C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix05:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4AD54AC-9115-4782-8CA1-F278C79A3C66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix06:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA1D0325-34F3-436D-A527-BFDC884E3C8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix07:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6C63873-5E2A-4FFD-9681-F2D6BE281237\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix08:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBB4C6A4-E296-4697-BBAE-A862DFAF6665\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix09:*:*:*:*:*:*\", \"matchCriteriaId\": \"71877702-48D7-4EE8-9A7C-C9CEDD63C4A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix10:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCAFE86A-E0A6-44CF-8692-BE75EDDF3700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix11:*:*:*:*:*:*\", \"matchCriteriaId\": \"74CA7501-3BC6-4227-A865-5D7B378D590A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix12:*:*:*:*:*:*\", \"matchCriteriaId\": \"726CB6C8-73BF-46D7-806E-731325D70A95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix13:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF2D5F08-5993-4900-A543-9ADE64E16755\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix14:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B8F70D1-ED38-4689-8DA9-110972170438\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix15:*:*:*:*:*:*\", \"matchCriteriaId\": \"B86C501E-D555-4CAF-AC09-40A35855C218\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix16:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6978E83-F831-4EB9-B3EF-A05FF733E596\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix17:*:*:*:*:*:*\", \"matchCriteriaId\": \"22F818F2-EBFE-48BB-AE44-1F865EE1AC51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix18:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5C523C0-E03D-4E97-AAD8-86E387D95296\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix19:*:*:*:*:*:*\", \"matchCriteriaId\": \"1315D200-164D-4FB6-A46F-6F70AD7C8234\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix20:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B83B5A9-42B7-4B1C-9B58-0298B69B5568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix21:*:*:*:*:*:*\", \"matchCriteriaId\": \"07030217-791D-4EE2-AD44-B0147B88CCA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix22:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CCEFC5B-EF57-4FBC-AC4C-CBA29103A8AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix23:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E14078D-A0B5-4FC5-B713-A06FE53B38AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix24:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4BE4C3E-FC4C-4A78-A9C1-0FB4D597CA4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix25:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE2ED381-5DF4-4905-9564-7C897F7DD3A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix26:*:*:*:*:*:*\", \"matchCriteriaId\": \"8281BE24-66D7-4F72-B656-6795F6A50AB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nuxeo:nuxeo:5.8.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE2E0C2C-0CE4-45F6-A2A4-85D4F21792FF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.\"}, {\"lang\": \"es\", \"value\": \"La implementaci\\u00f3n de RichFaces en Nuxeo Platform versi\\u00f3n 5.6.0 anterior a HF27 y versi\\u00f3n 5.8.0 anterior a HF-01, no restringe las clases para las que los m\\u00e9todos de deserializaci\\u00f3n pueden ser llamados, lo que permite a atacantes remotos ejecutar c\\u00f3digo arbitrario por medio de datos serializados dise\\u00f1ados. NOTA: esta vulnerabilidad puede solaparse con CVE-2013-2165.\"}]",
"id": "CVE-2013-4521",
"lastModified": "2024-11-21T01:55:43.977",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-02-06T16:15:11.087",
"references": "[{\"url\": \"http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1027052\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1027052\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-502\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-4521\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-02-06T16:15:11.087\",\"lastModified\":\"2024-11-21T01:55:43.977\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n de RichFaces en Nuxeo Platform versi\u00f3n 5.6.0 anterior a HF27 y versi\u00f3n 5.8.0 anterior a HF-01, no restringe las clases para las que los m\u00e9todos de deserializaci\u00f3n pueden ser llamados, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de datos serializados dise\u00f1ados. NOTA: esta vulnerabilidad puede solaparse con CVE-2013-2165.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"42899695-FAB5-4F81-86BE-89E3089CBB36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix01:*:*:*:*:*:*\",\"matchCriteriaId\":\"43160374-78C9-41E4-9884-C78ECD42B6AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix02:*:*:*:*:*:*\",\"matchCriteriaId\":\"03A3A542-E589-441A-8A8D-B997C9E028F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix03:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D3B6C0-EEA6-4BAE-9992-8C439204D03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix04:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DB7EFE4-DC2D-4DA9-B194-848E2DE3A16C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix05:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AD54AC-9115-4782-8CA1-F278C79A3C66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix06:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1D0325-34F3-436D-A527-BFDC884E3C8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix07:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C63873-5E2A-4FFD-9681-F2D6BE281237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix08:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB4C6A4-E296-4697-BBAE-A862DFAF6665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix09:*:*:*:*:*:*\",\"matchCriteriaId\":\"71877702-48D7-4EE8-9A7C-C9CEDD63C4A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix10:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCAFE86A-E0A6-44CF-8692-BE75EDDF3700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix11:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CA7501-3BC6-4227-A865-5D7B378D590A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix12:*:*:*:*:*:*\",\"matchCriteriaId\":\"726CB6C8-73BF-46D7-806E-731325D70A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix13:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2D5F08-5993-4900-A543-9ADE64E16755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix14:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B8F70D1-ED38-4689-8DA9-110972170438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix15:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86C501E-D555-4CAF-AC09-40A35855C218\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix16:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6978E83-F831-4EB9-B3EF-A05FF733E596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix17:*:*:*:*:*:*\",\"matchCriteriaId\":\"22F818F2-EBFE-48BB-AE44-1F865EE1AC51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix18:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5C523C0-E03D-4E97-AAD8-86E387D95296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix19:*:*:*:*:*:*\",\"matchCriteriaId\":\"1315D200-164D-4FB6-A46F-6F70AD7C8234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix20:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B83B5A9-42B7-4B1C-9B58-0298B69B5568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix21:*:*:*:*:*:*\",\"matchCriteriaId\":\"07030217-791D-4EE2-AD44-B0147B88CCA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix22:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCEFC5B-EF57-4FBC-AC4C-CBA29103A8AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix23:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E14078D-A0B5-4FC5-B713-A06FE53B38AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix24:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4BE4C3E-FC4C-4A78-A9C1-0FB4D597CA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix25:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2ED381-5DF4-4905-9564-7C897F7DD3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix26:*:*:*:*:*:*\",\"matchCriteriaId\":\"8281BE24-66D7-4F72-B656-6795F6A50AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nuxeo:nuxeo:5.8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE2E0C2C-0CE4-45F6-A2A4-85D4F21792FF\"}]}]}],\"references\":[{\"url\":\"http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1027052\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1027052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…