RULE(RULE ID:333643)

Rule General Information
Release Date: 2021-06-11
Rule Name: XStream 1.4.16 Remote Code Execution Vulnerability (CVE-2021-29505)
Severity:
CVE ID:
Rule Protection Details
Description: XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f
https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc
https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f@%3Cdev.jmeter.apache.org%3E
Solutions
The vendor has released upgrade patches to fix vulnerabilities, please visit:
https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc