CVE-2018-14667: Richfaces vulnerable to arbitrary code execution
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99457%
CWE
Published
5/13/2022
Updated
7/20/2023
KEV Status
Yes
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.richfaces:richfaces-core | maven | < 3.3.4 | 3.3.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on EL injection during deserialization of UserResource$UriData
objects. The primary vulnerable function is the readObject
method where deserialization occurs without proper validation. The getELContext
method is implicated as it would be involved in expression evaluation context setup. These functions would appear in stack traces when processing malicious serialized payloads through the UserResource
endpoint.