You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: canner/.m2/repository/com/thoughtworks/xstream/xstream/1.3.1/xstream-1.3.1.jar,madness/sub1/target/madness-sub1-2019.02.01/WEB-INF/lib/xstream-1.3.1.jar
XStream is vulnerable to a Remote Command Execution attack before version 1.4.17. The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
mend-bolt-for-githubbot
changed the title
CVE-2021-29505 (Medium) detected in xstream-1.3.1.jar
CVE-2021-29505 (High) detected in xstream-1.3.1.jar
May 26, 2021
CVE-2021-29505 - High Severity Vulnerability
Vulnerable Library - xstream-1.3.1.jar
Path to dependency file: madness/sub1/pom.xml
Path to vulnerable library: canner/.m2/repository/com/thoughtworks/xstream/xstream/1.3.1/xstream-1.3.1.jar,madness/sub1/target/madness-sub1-2019.02.01/WEB-INF/lib/xstream-1.3.1.jar
Dependency Hierarchy:
Found in HEAD commit: c964766c3fd9216cc5d6801df4461c29cd27692a
Vulnerability Details
XStream is vulnerable to a Remote Command Execution attack before version 1.4.17. The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
Publish Date: 2021-03-31
URL: CVE-2021-29505
CVSS 3 Score Details (8.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-7chv-rrw6-w6fc
Release Date: 2021-03-31
Fix Resolution: com.thoughtworks.xstream:xstream:1.4.17
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: