← Retour aux CVEs
CVE-2021-39144
HIGHCISA KEV8.5
Description
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
Details CVE
Score CVSS v3.18.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisLOW
Interaction utilisateurNONE
Publie8/23/2021
Derniere modification10/24/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurXStream
ProduitXStream
Nom vulnerabiliteXStream Remote Code Execution Vulnerability
Date ajout KEV2023-03-10
Date limite remediation2023-03-31
Utilise dans ransomwareUnknown
Produits affectes
debian:debian_linuxfedoraproject:fedoranetapp:snapmanageroracle:business_activity_monitoringoracle:commerce_guided_searchoracle:communications_billing_and_revenue_management_elastic_charging_engineoracle:communications_cloud_native_core_automated_test_suiteoracle:communications_cloud_native_core_binding_support_functionoracle:communications_cloud_native_core_policyoracle:communications_unified_inventory_managementoracle:retail_xstore_point_of_serviceoracle:utilities_frameworkoracle:utilities_testing_acceleratororacle:webcenter_portalxstream:xstream
Faiblesses (CWE)
CWE-94CWE-502CWE-306CWE-502
References
http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html(security-advisories@github.com)
https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh(security-advisories@github.com)
https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/(security-advisories@github.com)
https://security.netapp.com/advisory/ntap-20210923-0003/(security-advisories@github.com)
https://www.debian.org/security/2021/dsa-5004(security-advisories@github.com)
https://www.oracle.com/security-alerts/cpuapr2022.html(security-advisories@github.com)
https://www.oracle.com/security-alerts/cpujan2022.html(security-advisories@github.com)
https://www.oracle.com/security-alerts/cpujul2022.html(security-advisories@github.com)
https://x-stream.github.io/CVE-2021-39144.html(security-advisories@github.com)
http://packetstormsecurity.com/files/169859/VMware-NSX-Manager-XStream-Unauthenticated-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210923-0003/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-5004(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://x-stream.github.io/CVE-2021-39144.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-39144(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.