XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2021-08-23 12:15
Updated : 2022-10-05 05:22
NVD link : CVE-2021-39152
Mitre link : CVE-2021-39152
JSON object : View
Products Affected
oracle
- webcenter_portal
- communications_unified_inventory_management
- communications_cloud_native_core_binding_support_function
- communications_cloud_native_core_automated_test_suite
- utilities_testing_accelerator
- business_activity_monitoring
- utilities_framework
- communications_billing_and_revenue_management_elastic_charging_engine
- retail_xstore_point_of_service
- commerce_guided_search
- communications_cloud_native_core_policy
xstream_project
- xstream
fedoraproject
- fedora
netapp
- snapmanager
debian
- debian_linux