JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
{
"nvd_published_at": "2018-06-18T12:29:00Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-917"
],
"severity": "CRITICAL",
"github_reviewed_at": "2022-11-08T13:07:51Z"
}