RULE(RULE ID:335222)

Rule General Information
Release Date: 2021-12-20
Rule Name: XStream CPU Denial of Service Vulnerability (CVE-2021-21341)
Severity:
CVE ID:
Rule Protection Details
Description: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a allowlist limited to the minimal required types. If you rely on XStream's default blocklist of the Security Framework, you will have to use at least version 1.4.16.
Impact: An attacker can launch a denial of service attack by exploiting the vulnerability successfully.
Affected OS: Windows, Linux, Others
Reference: http://x-stream.github.io/changes.html#1.4.16
https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh
https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E
https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E
Solutions
The vendor has released upgrade patches to fix vulnerabilities, please visit:
http://x-stream.github.io/changes.html#1.4.16