CVE-2021-39152

NameCVE-2021-39152
DescriptionXStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2769-1, DSA-5004-1
Debian Bugs998054

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxstream-java (PTS)buster, buster (security)1.4.11.1-1+deb10u3fixed
bullseye (security), bullseye1.4.15-3+deb11u1fixed
bookworm, sid1.4.19-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxstream-javasourcestretch1.4.11.1-1+deb9u4DLA-2769-1
libxstream-javasourcebuster1.4.11.1-1+deb10u3DSA-5004-1
libxstream-javasourcebullseye1.4.15-3+deb11u1DSA-5004-1
libxstream-javasource(unstable)1.4.18-1998054

Notes

https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2
https://x-stream.github.io/CVE-2021-39152.html

Search for package or bug name: Reporting problems