Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
8.8HIGH
EPSS
90.8%
top 0.38%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 28
Latest updateJul 15

Description

XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages17 packages

Debianlibxstream-java< 1.4.15-3+3
NVDxstream/xstream< 1.4.17
CVEListV5x-stream/xstream< 1.4.17
NVDoracle/webcenter_sites12.2.1.3.0, 12.2.1.4.0+1

Also affects: Debian Linux 10.0, 11.0, 9.0, Fedora 33, 34, 35

Patches

🔴Vulnerability Details

4
CVEList
XStream is vulnerable to a Remote Command Execution attack2021-05-28
OSV
CVE-2021-29505: XStream is software for serializing Java objects to XML and back again2021-05-28
GHSA
XStream is vulnerable to a Remote Command Execution attack2021-05-18
OSV
XStream is vulnerable to a Remote Command Execution attack2021-05-18

💥Exploits & PoCs

1
Nuclei
XStream <1.4.17 - Remote Code Execution

📋Vendor Advisories

5
Oracle
Oracle Oracle Retail Applications Risk Matrix: Other (XStream) — CVE-2021-295052022-07-15
Oracle
Oracle Oracle Communications Applications Risk Matrix: Rulesets (XStream) — CVE-2021-295052022-01-15
Oracle
Oracle Oracle Enterprise Manager Risk Matrix: Guest Management (XStream) — CVE-2021-295052021-10-15
Red Hat
XStream: remote command execution attack by manipulating the processed input stream2021-05-14
Debian
CVE-2021-29505: libxstream-java - XStream is software for serializing Java objects to XML and back again. A vulner...2021