UBUNTU-CVE-2013-4221

Source
https://ubuntu.com/security/CVE-2013-4221
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-4221.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2013-4221
Upstream
  • CVE-2013-4221
Published
2013-10-10T00:55:00Z
Modified
2025-10-24T04:45:02Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.

References

Affected packages

Ubuntu:16.04:LTS / restlet

Package

Name
restlet
Purl
pkg:deb/ubuntu/restlet@2.0.14+repack-0ubuntu1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.0.14+repack-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "librestlet-java",
            "binary_version": "2.0.14+repack-0ubuntu1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-4221.json"

Ubuntu:18.04:LTS / restlet

Package

Name
restlet
Purl
pkg:deb/ubuntu/restlet@2.0.14+repack-0ubuntu1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.0.14+repack-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "librestlet-java",
            "binary_version": "2.0.14+repack-0ubuntu1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-4221.json"