You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /.m2/repository/com/thoughtworks/xstream/xstream/1.4.10/xstream-1.4.10.jar,/.m2/repository/com/thoughtworks/xstream/xstream/1.4.10/xstream-1.4.10.jar
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.18.
CVE-2021-39152 - High Severity Vulnerability
Vulnerable Library - xstream-1.4.10.jar
XStream is a serialization library from Java objects to XML and back.
Library home page: http://x-stream.github.io
Path to dependency file: /plugins/rest/pom.xml
Path to vulnerable library: /.m2/repository/com/thoughtworks/xstream/xstream/1.4.10/xstream-1.4.10.jar,/.m2/repository/com/thoughtworks/xstream/xstream/1.4.10/xstream-1.4.10.jar
Dependency Hierarchy:
Found in HEAD commit: 6950763af860884188f4080d19a18c5ede16cd74
Found in base branch: master
Vulnerability Details
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.18.
Publish Date: 2021-08-23
URL: CVE-2021-39152
CVSS 3 Score Details (8.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-xw4p-crpj-vjx2
Release Date: 2021-08-23
Fix Resolution: 1.4.18
The text was updated successfully, but these errors were encountered: