CVE-2021-39153
Publication date 23 August 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
Status
Package | Ubuntu Release | Status |
---|---|---|
libxstream-java | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Fixed 1.4.11.1-1ubuntu0.3
|
|
18.04 LTS bionic |
Fixed 1.4.11.1-1+deb10u4build0.18.04.1
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
sahnaseredini
for `trusty` and `xenial`, the code is not present and the available pocs cannot be exploited
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.5 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5946-1
- XStream vulnerabilities
- 13 March 2023