Описание
XStream can cause a Denial of Service by injecting deeply nested objects raising a stack overflow
Impact
The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream.
Patches
XStream 1.4.20 handles the stack overflow and raises an InputManipulationException instead.
Workarounds
The only solution is to catch the StackOverflowError in the client code calling XStream.
References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for CVE-2022-40151.
Credits
The vulnerability was discovered and reported by Henry Lin of the Google OSS-Fuzz team.
For more information
If you have any questions or comments about this advisory:
- Open an issue in XStream
- Contact us at XStream Google Group
Ссылки
- https://github.com/x-stream/xstream/security/advisories/GHSA-f8cc-g7j8-xxpm
- https://nvd.nist.gov/vuln/detail/CVE-2022-40151
- https://github.com/x-stream/xstream/issues/304
- https://github.com/x-stream/xstream/issues/314
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367
- https://x-stream.github.io/CVE-2022-40151.html
Пакеты
com.thoughtworks.xstream:xstream
< 1.4.20
1.4.20
Связанные уязвимости
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Those using Xstream to seralize XML data may be vulnerable to Denial o ...
Уязвимость Java-библиотеки для преобразования объектов в XML или JSON формат XStream, связанная с переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании