Описание
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
Ссылки
- Release NotesThird Party Advisory
- Third Party Advisory
- Third Party AdvisoryIssue TrackingMailing List
- Third Party AdvisoryIssue TrackingMailing List
- Mailing ListThird Party Advisory
- Third Party AdvisoryMailing List
- Third Party AdvisoryMailing List
- Third Party AdvisoryMailing List
- Third Party Advisory
- Third Party AdvisoryMailing List
- Third Party Advisory
- PatchVendor Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- MitigationThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
- Third Party AdvisoryIssue TrackingMailing List
- Third Party AdvisoryIssue TrackingMailing List
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
6.1 Medium
CVSS3
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
XStream is a Java library to serialize objects to XML and back again. ...
XStream is vulnerable to an Arbitrary Code Execution attack
Уязвимость Java-библиотеки Xstream для преобразования объектов в форматы XML или JSON, связанная с неограниченной загрузкой файлов опасного типа, позволяющая нарушителю загружать и выполнять произвольный код
EPSS
6.1 Medium
CVSS3
9.8 Critical
CVSS3
7.5 High
CVSS2