XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
23 May 2025, 16:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:xstream:xstream:*:*:*:*:*:*:*:* | |
First Time |
Xstream
Xstream xstream |
21 Nov 2024, 06:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh - Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ - Mailing List, Release Notes | |
References | () https://security.netapp.com/advisory/ntap-20210923-0003/ - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5004 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory | |
References | () https://x-stream.github.io/CVE-2021-39144.html - Exploit, Vendor Advisory |
28 Jun 2024, 13:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ - Mailing List, Release Notes |
07 Nov 2023, 03:37
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
26 Jun 2023, 19:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 | |
References | (CONFIRM) https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh - Vendor Advisory |
Information
Published : 2021-08-23 18:15
Updated : 2025-05-23 16:49
NVD link : CVE-2021-39144
Mitre link : CVE-2021-39144
CVE.ORG link : CVE-2021-39144
JSON object : View
Products Affected
debian
- debian_linux
oracle
- webcenter_portal
- communications_billing_and_revenue_management_elastic_charging_engine
- communications_cloud_native_core_binding_support_function
- communications_cloud_native_core_policy
- utilities_framework
- communications_cloud_native_core_automated_test_suite
- business_activity_monitoring
- utilities_testing_accelerator
- communications_unified_inventory_management
- retail_xstore_point_of_service
- commerce_guided_search
netapp
- snapmanager
fedoraproject
- fedora
xstream
- xstream