Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-39144

Опубликовано: 22 авг. 2021
Источник: redhat
CVSS3: 8.5

Описание

XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.

A flaw was found in xstream, a simple library used to serialize objects to XML and back again. This flaw allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream.

Отчет

Users who follow the recommended security framework with a whitelist to limit the types to the minimum required should not be affected. XStream 1.4.18 no longer uses a blacklist by default since it cannot be secured for general purposes. OpenShift Container Platform (OCP) delivers Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, OCP Jenkins package is not affected by this flaw. This version of XStream library will be delivered in future Jenkins releases. [1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc [2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security For more information, please refer to the Red Hat solution Article explaining this issue. OpenShift Logging's Elasticsearch 6.8.1 using opendistro_security v0.10.1.2 is not affected by the vulnerable code because com.thoughtworks.xstream is only a build-time dependency.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2xstreamNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Migration Toolkit for Applications 6org.keycloak-keycloak-parentNot affected
Migration Toolkit for Runtimesorg.keycloak-keycloak-parentNot affected
OpenShift Developer Tools and ServicesjenkinsNot affected
Red Hat AMQ Broker 7xstreamNot affected
Red Hat BPM Suite 6xstreamOut of support scope
Red Hat build of Apache Camel for Spring Boot 3xstreamNot affected
Red Hat build of Apicurio Registry 2xstreamNot affected
Red Hat build of Debezium 1xstreamNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1997772xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.*

8.5 High

CVSS3

Связанные уязвимости

CVSS3: 8.5
ubuntu
около 4 лет назад

XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.

CVSS3: 8.5
nvd
около 4 лет назад

XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.

CVSS3: 8.5
debian
около 4 лет назад

XStream is a simple library to serialize objects to XML and back again ...

CVSS3: 8.5
github
около 4 лет назад

XStream is vulnerable to a Remote Command Execution attack

CVSS3: 8.5
fstec
почти 4 года назад

Уязвимость Java-библиотеки для преобразования объектов в XML или JSON формат XStream платформы виртуализации VMware Cloud Foundation, позволяющая нарушителю выполнить произвольный код с root-привилегиями

8.5 High

CVSS3