Arbitrary Java Code Execution via Crafted URL in JBoss Seam 2 Framework

Arbitrary Java Code Execution via Crafted URL in JBoss Seam 2 Framework

CVE-2011-1484 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:P/A:P

jboss-seam.jar in the JBoss Seam 2 framework 2.2.x and earlier, as distributed in Red Hat JBoss Enterprise SOA Platform 4.3.0.CP04 and 5.1.0 and JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3.0.CP09 and 5.1.0, does not properly restrict use of Expression Language (EL) statements in FacesMessages during page exception handling, which allows remote attackers to execute arbitrary Java code via a crafted URL to an application.

Learn more about our Web Application Penetration Testing UK.