Xstream remote code execution vulnerability-vulnerability warning-the black bar safety net

ID MYHACK58:62201995222
Type myhack58
Reporter 佚名
Modified 2019-07-25T00:00:00


One, the Foreword

XStream is a commonly used Java class libraries used to serialize an object into XML, JSON or deserialize the object.

Second, the vulnerability profile

Xstream 1.4.10 version exists deserialization vulnerability CVE-2013-7285 patch bypass.

Third, the vulnerability to hazards

The bucket like a security emergency response team analysis, when using Xstream 1.4.10 version and not on the security framework initialized, the attacker can carefully construct the request packet in use Xstream on the server to remote code execution.

Fourth, the scope of the impact




Xstream1. 4. 10 version



Fifth, the vulnerability reproduction


Six, solution

Upgrade Xstream to 1. 4. 11 version

Seven, reference

> http://x-stream.github.io/changes.html#1.4.11 > > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10173

The above is the high-risk vulnerability and early warning related information, if you have any questions or need more support, you can contact us.

Contact phone: 400-156-9866

Email: help@tophant.com

Bucket like the Security Emergency Response Team

2019 7 December 25