Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-29505

Опубликовано: 28 мая 2021
Источник: debian
EPSS Критический

Описание

XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxstream-javafixed1.4.15-3package
libxstream-javafixed1.4.11.1-1+deb10u3busterpackage

Примечания

  • https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc

  • https://github.com/x-stream/xstream/commit/f0c4a8d861b68ffc3119cfbbbd632deee624e227 (v1.4.17)

EPSS

Процентиль: 100%
0.90769
Критический

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.

CVSS3: 7.5
redhat
больше 4 лет назад

XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.

CVSS3: 7.5
nvd
больше 4 лет назад

XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.

suse-cvrf
больше 4 лет назад

Security update for xstream

suse-cvrf
больше 4 лет назад

Security update for xstream

EPSS

Процентиль: 100%
0.90769
Критический