You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: ecossistemas/hr-eurekaserver/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
CVE-2021-21350 - High Severity Vulnerability
Vulnerable Library - xstream-1.4.14.jar
Library home page: http://x-stream.github.io
Path to dependency file: ecossistemas/hr-eurekaserver/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.14/xstream-1.4.14.jar
Dependency Hierarchy:
Found in HEAD commit: e15b11f25c09db87ec8d05d57b6e62f1bb4856a0
Found in base branch: develop
Vulnerability Details
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
Publish Date: 2021-03-23
URL: CVE-2021-21350
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-43gc-mjxg-gvrq
Release Date: 2021-03-23
Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: