XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 06:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh - Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ - Mailing List, Release Notes | |
References | () https://security.netapp.com/advisory/ntap-20210923-0003/ - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5004 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory | |
References | () https://x-stream.github.io/CVE-2021-39144.html - Exploit, Vendor Advisory |
28 Jun 2024, 13:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ - Mailing List, Release Notes |
07 Nov 2023, 03:37
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
26 Jun 2023, 19:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 | |
References | (CONFIRM) https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh - Vendor Advisory |
Information
Published : 2021-08-23 18:15
Updated : 2025-02-18 14:47
NVD link : CVE-2021-39144
Mitre link : CVE-2021-39144
CVE.ORG link : CVE-2021-39144
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
oracle
- webcenter_portal
- commerce_guided_search
- retail_xstore_point_of_service
- utilities_testing_accelerator
- communications_unified_inventory_management
- business_activity_monitoring
- communications_cloud_native_core_binding_support_function
- communications_cloud_native_core_policy
- communications_cloud_native_core_automated_test_suite
- communications_billing_and_revenue_management_elastic_charging_engine
- utilities_framework
xstream_project
- xstream
netapp
- snapmanager