CVE-2021-39150
Publication date 23 August 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
Status
Package | Ubuntu Release | Status |
---|---|---|
libxstream-java | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Fixed 1.4.11.1-1ubuntu0.3
|
|
18.04 LTS bionic |
Fixed 1.4.11.1-1+deb10u4build0.18.04.1
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
sahnaseredini
for `trusty` and `xenial`, the code is not present and the available pocs cannot be exploited
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.5 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5946-1
- XStream vulnerabilities
- 13 March 2023