CVE-2021-39144

Published Aug 23, 2021

Last updated 5 months ago

Overview

Description
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
Source
security-advisories@github.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
8.5
Impact score
6
Exploitability score
1.8
Vector string
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
6
Impact score
6.4
Exploitability score
6.8
Vector string
AV:N/AC:M/Au:S/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
XStream Remote Code Execution Vulnerability
Exploit added on
Mar 10, 2023
Exploit action due
Mar 31, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-306
security-advisories@github.com
CWE-502

Social media

Hype score
Not currently trending

Configurations