Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-21345
HistoryMar 22, 2021 - 11:40 p.m.

CVE-2021-21345 XStream is vulnerable to a Remote Command Execution attack

2021-03-2223:40:25
CWE-94
CWE-502
GitHub_M
www.cve.org
6
xstream
java
remote command execution
vulnerability
xml serialization
security framework

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N

AI Score

9.8

Confidence

High

EPSS

0.272

Percentile

96.9%

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. If you rely on XStream’s default blacklist of the Security Framework, you will have to use at least version 1.4.16.

CNA Affected

[
  {
    "product": "xstream",
    "vendor": "x-stream",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.4.16"
      }
    ]
  }
]

References

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N

AI Score

9.8

Confidence

High

EPSS

0.272

Percentile

96.9%