JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
{
    "nvd_published_at": "2018-06-18T12:29:00Z",
    "severity": "CRITICAL",
    "cwe_ids": [
        "CWE-917"
    ],
    "github_reviewed_at": "2022-11-08T13:07:51Z",
    "github_reviewed": true
}