Expression Language Injection Vulnerability in JBoss RichFaces by Red Hat
CVE-2018-12533

9.8CRITICAL

Key Information:

Vendor

Redhat

Status
Vendor
CVE Published:
18 June 2018

Badges

👾 Exploit Exists🟡 Public PoC🟣 EPSS 73%

What is CVE-2018-12533?

The JBoss RichFaces framework versions 3.1.0 to 3.3.4 are susceptible to an expression language injection vulnerability. This flaw allows unauthenticated remote attackers to inject EL expressions and potentially execute arbitrary Java code. This can occur when the application processes paths that include a /DATA/ substring, exposing an org.richfaces.renderkit.html.Paint2DResource$ImageData object. Such exploitation poses a risk of unauthorized access and manipulation of data, leading to severe security breaches.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

73% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.