CVE-2021-39144

ADVISORY - github

Summary

Impact

The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.

Patches

XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.

Workarounds

See workarounds for the different versions covering all CVEs.

References

See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for CVE-2021-39144.

Credits

Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.

For more information

If you have any questions or comments about this advisory:

EPSS Score: 0.9438 (1.000)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Missing Authentication for Critical Function

Deserialization of Untrusted Data

Improper Control of Generation of Code ('Code Injection')

ADVISORY - github

Missing Authentication for Critical Function

Deserialization of Untrusted Data

Improper Control of Generation of Code ('Code Injection')

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Missing Authentication for Critical Function

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in