A flaw was found in the way Restlet handled deserialization. Restlet applications which use ObjectRepresentation to map HTTP request data directly to an object will deserialize arbitrary user-provided serialized data. A remote attacker could use this flaw to trigger the execution of the deserialization methods in any serializable class deployed on the server. This could lead to a variety of security impacts depending on the deserialization logic of these classes.
Acknowledgements: This issue was discovered by David Jorm of the Red Hat Security Response Team.
External References: http://restlet.org/learn/2.1/changes Upstream bug: https://github.com/restlet/restlet-framework-java/issues/778
This flaw is resolved in restlet 2.1.4, by disabling the vulnerable use cases.
This issue has been addressed in following products: Red Hat JBoss Fuse 6.0.0 Via RHSA-2013:1410 https://rhn.redhat.com/errata/RHSA-2013-1410.html
This issue has been addressed in following products: Fuse ESB Enterprise 7.1.0 Via RHSA-2013:1862 https://rhn.redhat.com/errata/RHSA-2013-1862.html