A flaw was found in the way Nuxeo RichFaces handled deserialization. A remote attacker could use this flaw to trigger the execution of the deserialization methods in any serializable class deployed on the server. This could lead to a variety of security impacts depending on the deserialization logic of these classes. On Nuxeo Server 5.6, 5.7.4 and 5.8, this can be used to trigger deserialization logic which leads to unauthenticated remote code execution.
Statement: Not vulnerable. This flaw does not affect RichFaces as shipped with various JBoss products. These products use JBoss RichFaces, which is covered by CVE-2013-2165. This flaw pertains specifically to Nuxeo RichFaces.
Upstream patch commit: https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec
Acknowledgements: This issue was discovered by Arun Neelicattu and David Jorm of the Red Hat Security Response Team.
Upstream advisory: http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+HotFix https://connect.nuxeo.com/nuxeo/site/marketplace/hotfixes/cap-5.8