XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2020-11-16 13:15
Updated : 2022-10-28 10:40
NVD link : CVE-2020-26217
Mitre link : CVE-2020-26217
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
oracle
- banking_credit_facilities_process_management
- banking_cash_management
- banking_corporate_lending_process_management
- banking_platform
- banking_supply_chain_finance
- communications_policy_management
- business_activity_monitoring
- retail_xstore_point_of_service
- banking_trade_finance_process_management
- banking_virtual_account_management
- endeca_information_discovery_studio
xstream_project
- xstream
netapp
- snapmanager
apache
- activemq
debian
- debian_linux