JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
{ "nvd_published_at": "2018-06-18T12:29:00Z", "github_reviewed_at": "2022-11-08T13:07:51Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-917" ] }