VYPR
High severityNVD Advisory· Published Oct 10, 2013· Updated Apr 29, 2026

CVE-2013-4271

CVE-2013-4271

Description

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.restlet.jse:org.restletMaven
< 2.1.42.1.4

Affected products

16
  • Restlet/Restlet16 versions
    cpe:2.3:a:restlet:restlet:*:*:*:*:*:*:*:*+ 15 more
    • cpe:2.3:a:restlet:restlet:*:*:*:*:*:*:*:*range: <=2.1.3
    • cpe:2.3:a:restlet:restlet:2.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:milestone1:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:milestone2:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:milestone3:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:milestone4:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:milestone5:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:milestone6:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:rc1:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:rc2:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:rc3:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:rc4:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:rc5:*:*:*:*:*:*
    • cpe:2.3:a:restlet:restlet:2.1:rc6:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.