|
|||
Rule General Information |
---|
Release Date: | 2021-06-11 | |
Rule Name: | XStream 1.4.16 Remote Code Execution Vulnerability (CVE-2021-29505) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f@%3Cdev.jmeter.apache.org%3E |
|
Solutions |
---|
The vendor has released upgrade patches to fix vulnerabilities, please visit: https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc |