Lucene search

K
cveGitHub_MCVE-2021-39151
HistoryAug 23, 2021 - 6:15 p.m.

CVE-2021-39151

2021-08-2318:15:12
CWE-502
CWE-434
GitHub_M
web.nvd.nist.gov
193
xstream
vulnerability
remote code execution
cve-2021-39151
xstream 1.4.18

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.03

Percentile

91.1%

XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.

Affected configurations

Nvd
Vulners
Node
xstream_projectxstreamRange<1.4.18
Node
fedoraprojectfedoraMatch33
OR
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
Node
netappsnapmanagerMatch-oracle
OR
netappsnapmanagerMatch-sap
Node
oraclebusiness_activity_monitoringMatch12.2.1.4.0
OR
oraclecommerce_guided_searchMatch11.3.2
OR
oraclecommunications_billing_and_revenue_management_elastic_charging_engineMatch11.3
OR
oraclecommunications_billing_and_revenue_management_elastic_charging_engineMatch12.0
OR
oraclecommunications_cloud_native_core_automated_test_suiteMatch1.9.0
OR
oraclecommunications_cloud_native_core_binding_support_functionMatch1.10.0
OR
oraclecommunications_cloud_native_core_policyMatch1.14.0
OR
oraclecommunications_unified_inventory_managementMatch7.3.4
OR
oraclecommunications_unified_inventory_managementMatch7.3.5
OR
oraclecommunications_unified_inventory_managementMatch7.4.0
OR
oraclecommunications_unified_inventory_managementMatch7.4.1
OR
oraclecommunications_unified_inventory_managementMatch7.4.2
OR
oracleretail_xstore_point_of_serviceMatch16.0.6
OR
oracleretail_xstore_point_of_serviceMatch17.0.2
OR
oracleretail_xstore_point_of_serviceMatch18.0.3
OR
oracleretail_xstore_point_of_serviceMatch19.0.2
OR
oracleretail_xstore_point_of_serviceMatch20.0.1
OR
oracleutilities_frameworkMatch4.2.0.2.0
OR
oracleutilities_frameworkMatch4.2.0.3.0
OR
oracleutilities_frameworkMatch4.3.0.1.0
OR
oracleutilities_frameworkMatch4.3.0.6.0
OR
oracleutilities_frameworkMatch4.4.0.0.0
OR
oracleutilities_frameworkMatch4.4.0.2.0
OR
oracleutilities_frameworkMatch4.4.0.3.0
OR
oracleutilities_testing_acceleratorMatch6.0.0.1.1
OR
oraclewebcenter_portalMatch12.2.1.3.0
OR
oraclewebcenter_portalMatch12.2.1.4.0
VendorProductVersionCPE
xstream_projectxstream*cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*
fedoraprojectfedora33cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
fedoraprojectfedora34cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
fedoraprojectfedora35cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
debiandebian_linux9.0cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
debiandebian_linux11.0cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
netappsnapmanager-cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
netappsnapmanager-cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
oraclebusiness_activity_monitoring12.2.1.4.0cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 361

CNA Affected

[
  {
    "product": "xstream",
    "vendor": "x-stream",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.4.18 "
      }
    ]
  }
]

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.03

Percentile

91.1%