XStream Remote Code Execution (RCE) Vulnerability - 20230314002¶
Overview¶
The WA SOC has received information regarding a new vulnerability found in XStream which elevates the risks to organisations.
What is the vulnerability?¶
CVE-2021-39144 - XStream Remote Code Execution Vulnerability
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
What is vulnerable?¶
The Remote Code Execution vulnerability affects the following products:
- XStream Project - All versions up to (excluding) 1.4.18
To find a comprehensive list of the known affected software configurations click here.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices.
Additional References¶
Weakness Enumeration¶
CWE-ID | CWE Name | Source |
---|---|---|
CWE-502 | Deserialization of Untrusted Data | NIST, GitHub, Inc. |
CWE-94 | Improper Control of Generation of Code ('Code Injection') | GitHub, Inc. |