-
CVSS Score
-The vulnerability description explicitly implicates the ObjectRepresentation class in Restlet as the source of insecure deserialization. The CWE-502 (Deserialization of Untrusted Data) and advisory details confirm that the class's default behavior automatically deserializes HTTP request data. The getObject() method is the logical entry point for retrieving deserialized objects in such representations, making it the most likely vulnerable function. While the exact code diff isn't provided, the consistent focus on ObjectRepresentation across all references and the nature of the vulnerability strongly support this conclusion.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.restlet.jse:org.restlet | maven | < 2.1.4 | 2.1.4 |
A Semantic Attack on Google Gemini - Read the Latest Research