Уязвимость захвата потока, потребляющего максимальное процессорное время в XStream до версии 1.4.16
Описание
XStream — это Java-библиотека для сериализации объектов в XML и обратно. В XStream до версии 1.4.16 существует уязвимость, позволяющая злоумышленнику занять поток, который потребляет максимальное время работы процессора и никогда не возвращается. Пользователь не затронут, если следовал рекомендации по настройке системы безопасности XStream, используя список разрешённых типов, ограниченный до минимальных необходимых.
Затронутые версии ПО
- XStream до версии 1.4.16
Тип уязвимости
Захват потока
Ссылки
- Release NotesThird Party Advisory
- Third Party Advisory
- Third Party AdvisoryIssue TrackingMailing List
- Third Party AdvisoryIssue TrackingMailing List
- Mailing ListThird Party Advisory
- Third Party AdvisoryMailing List
- Third Party AdvisoryMailing List
- Third Party AdvisoryMailing List
- Third Party Advisory
- Third Party AdvisoryMailing List
- Third Party Advisory
- PatchVendor Advisory
- Third Party Advisory
- Third Party Advisory
- MitigationThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
- Third Party AdvisoryIssue TrackingMailing List
- Third Party AdvisoryIssue TrackingMailing List
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
5.3 Medium
CVSS3
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
Связанные уязвимости
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
XStream is a Java library to serialize objects to XML and back again. ...
XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos)
Уязвимость Java-библиотеки Xstream для преобразования объектов в форматы XML или JSON, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5.3 Medium
CVSS3
7.5 High
CVSS3
7.8 High
CVSS2