Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-7285

Опубликовано: 22 дек. 2013
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.

It was found that XStream could deserialize arbitrary user-supplied XML content, representing objects of any type. A remote attacker able to pass XML to XStream could use this flaw to perform a variety of attacks, including remote code execution in the context of the server running the XStream application.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Enterprise 1xstreamWill not fix
Red Hat Enterprise Linux 7xstreamNot affected
Red Hat JBoss Enterprise Web Server 1amq-6.0Affected
Red Hat JBoss Enterprise Web Server 1fuse-6.0Affected
Red Hat JBoss Enterprise Web Server 1fuse-esb-7.1Affected
Red Hat JBoss Enterprise Web Server 1fuse-mq-7.1Affected
Red Hat JBoss SOA Platform 4.3xstreamWill not fix
Red Hat OpenShift Enterprise 2xstreamAffected
Fuse ESB Enterprise 7.1.0FixedRHSA-2014:045230.04.2014
Fuse Management Console 7.1.0FixedRHSA-2014:045230.04.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=1051277XStream: remote code execution due to insecure XML deserialization

EPSS

Процентиль: 94%
0.15054
Средний

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.

CVSS3: 9.8
nvd
больше 6 лет назад

Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.

CVSS3: 9.8
debian
больше 6 лет назад

Xstream API versions up to 1.4.6 and version 1.4.10, if the security f ...

CVSS3: 9.8
github
больше 6 лет назад

Command Injection in Xstream

EPSS

Процентиль: 94%
0.15054
Средний

6.8 Medium

CVSS2