XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 03:37
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-08-23 19:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-39150
Mitre link : CVE-2021-39150
CVE.ORG link : CVE-2021-39150
JSON object : View
Products Affected
oracle
- utilities_framework
- business_activity_monitoring
- communications_cloud_native_core_automated_test_suite
- communications_billing_and_revenue_management_elastic_charging_engine
- retail_xstore_point_of_service
- commerce_guided_search
- communications_cloud_native_core_binding_support_function
- communications_unified_inventory_management
- utilities_testing_accelerator
- communications_cloud_native_core_policy
- webcenter_portal
debian
- debian_linux
xstream_project
- xstream
fedoraproject
- fedora
netapp
- snapmanager