CVE-2013-7285
Summary
| CVE | CVE-2013-7285 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-05-15 17:29:00 UTC |
| Updated | 2023-11-07 02:18:00 UTC |
| Description | Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Dinis Cruz Blog: XStream "Remote Code Execution" exploit on code from "Standard way to serialize and deserialize Objects with XStream" article |
MISC |
blog.diniscruz.com |
Exploit, Third Party Advisory |
| Pony Mail! |
|
lists.apache.org |
|
| Dinis Cruz Blog: XStream "Remote Code Execution" exploit on code from "Standard way to serialize and deserialize Objects with XStream" article |
MISC |
web.archive.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| [xstream-user] Re: Re: Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper |
|
www.mail-archive.com |
|
| Pony Mail! |
|
lists.apache.org |
|
| [xstream-user] Re: Re: Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper |
MLIST |
www.mail-archive.com |
Mailing List, Third Party Advisory |
| XStream - CVE-2013-7285 |
CONFIRM |
x-stream.github.io |
Exploit, Third Party Advisory |
| Oracle Critical Patch Update Advisory - October 2020 |
MISC |
www.oracle.com |
|
| Re: [xstream-user] Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper |
MLIST |
www.mail-archive.com |
Mailing List, Third Party Advisory |
| Re: [xstream-user] Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper |
|
www.mail-archive.com |
|
| oss-sec: Re: CVE request: remote code execution via deserialization in XStream |
MLIST |
seclists.org |
Mailing List, Third Party Advisory |
| Pony Mail! |
MLIST |
lists.apache.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 375827 XStream Arbitrary Code Execution And Multiple vulnerabilities
- 981787 Java (maven) Security Update for com.thoughtworks.xstream:xstream (GHSA-f554-x222-wgf7)