Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10173

Опубликовано: 23 июл. 2019
Источник: debian

Описание

It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285)

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxstream-javafixed1.4.11-1package
libxstream-javanot-affectedstretchpackage
libxstream-javanot-affectedjessiepackage

Примечания

  • http://x-stream.github.io/changes.html#1.4.11

  • Regression introduced and present only in 1.4.10.

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285)

CVSS3: 7.3
redhat
больше 7 лет назад

It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285)

CVSS3: 9.8
nvd
больше 6 лет назад

It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285)

CVSS3: 9.8
github
больше 6 лет назад

Deserialization of Untrusted Data and Code Injection in xstream

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость Java-библиотеки для преобразования объектов в XML или JSON формат XStream, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольные команды