Описание
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
Ссылки
- Release NotesThird Party Advisory
- Third Party Advisory
- Third Party AdvisoryIssue TrackingMailing List
- Third Party AdvisoryIssue TrackingMailing List
- Mailing ListThird Party Advisory
- Third Party AdvisoryMailing List
- Third Party AdvisoryMailing List
- Third Party AdvisoryMailing List
- Third Party Advisory
- Third Party AdvisoryMailing List
- Third Party Advisory
- PatchThird Party Advisory
- PatchVendor Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- MitigationThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
- Third Party AdvisoryIssue TrackingMailing List
- Third Party AdvisoryIssue TrackingMailing List
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
5.8 Medium
CVSS3
9.9 Critical
CVSS3
6.5 Medium
CVSS2
Дефекты
Связанные уязвимости
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
XStream is a Java library to serialize objects to XML and back again. ...
XStream is vulnerable to a Remote Command Execution attack
Уязвимость Java-библиотеки Xstream для преобразования объектов в форматы XML или JSON, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнять команды на хосте
EPSS
5.8 Medium
CVSS3
9.9 Critical
CVSS3
6.5 Medium
CVSS2