XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
References
Link Resource
http://x-stream.github.io/changes.html#1.4.16 Release Notes Third Party Advisory
https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4 Third Party Advisory
https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd%40%3Cusers.activemq.apache.org%3E
https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0%40%3Cdev.jmeter.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/
https://security.netapp.com/advisory/ntap-20210430-0002/ Third Party Advisory
https://www.debian.org/security/2021/dsa-5004 Third Party Advisory
https://www.oracle.com//security-alerts/cpujul2021.html Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html Third Party Advisory
https://x-stream.github.io/CVE-2021-21345.html Exploit Third Party Advisory
https://x-stream.github.io/security.html#workaround Mitigation Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: GitHub_M

Published: 2021-03-22T23:40:25

Updated: 2022-02-07T14:41:17

Reserved: 2020-12-22T00:00:00


Link: CVE-2021-21345

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2021-03-23T00:15:12.787

Modified: 2023-11-07T03:29:53.763


Link: CVE-2021-21345

JSON object: View

cve-icon Redhat Information

No data.