|
|||
Rule General Information |
---|
Release Date: | 2021-12-20 | |
Rule Name: | XStream CPU Denial of Service Vulnerability (CVE-2021-21341) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a allowlist limited to the minimal required types. If you rely on XStream's default blocklist of the Security Framework, you will have to use at least version 1.4.16. | |
Impact: | An attacker can launch a denial of service attack by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Linux, Others | |
Reference: | http://x-stream.github.io/changes.html#1.4.16 https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E |
|
Solutions |
---|
The vendor has released upgrade patches to fix vulnerabilities, please visit: http://x-stream.github.io/changes.html#1.4.16 |