CVE-2021-29505

Published on: 05/28/2021 12:00:00 AM UTC

Last Modified on: 07/25/2022 07:09:18 PM UTC

CVE-2021-29505 - advisory for GHSA-7chv-rrw6-w6fc

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.

  • CVE-2021-29505 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: URL Logo x-stream - xstream version < 1.4.17

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
[SECURITY] Fedora 34 Update: xstream-1.4.18-2.fc34 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2021-d894ca87dc
XStream is vulnerable to a Remote Command Execution attack · Advisory · x-stream/xstream · GitHub github.com
text/html
URL Logo CONFIRM github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc
[SECURITY] [DLA 2704-1] libxstream-java security update lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20210705 [SECURITY] [DLA 2704-1] libxstream-java security update
Oracle Critical Patch Update Advisory - April 2022 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuapr2022.html
Add description of CVE-2021-29505 and bug fix. · x-stream/[email protected] · GitHub github.com
text/html
URL Logo MISC github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f
Oracle Critical Patch Update Advisory - October 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuoct2021.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [jmeter-dev] 20210607 [GitHub] [jmeter] sseide opened a new pull request #667: update x-stream to 1.4.17 (from 1.4.16)
Oracle Critical Patch Update Advisory - January 2022 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujan2022.html
Debian -- Security Information -- DSA-5004-1 libxstream-java www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-5004
CVE-2021-29505 XStream Vulnerability in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20210708-0007/
[SECURITY] Fedora 33 Update: xstream-1.4.18-2.fc33 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2021-fbad11014a
[SECURITY] Fedora 35 Update: xstream-1.4.18-2.fc35 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2021-5e376c0ed9
Oracle Critical Patch Update Advisory - July 2022 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujul2022.html

Related QID Numbers

  • 159301 Oracle Enterprise Linux Security Update for xstream (ELSA-2021-2683)
  • 178698 Debian Security Update for libxstream-java (DLA 2704-1)
  • 178889 Debian Security Update for libxstream-java (DSA 5004-1)
  • 178890 Debian Security Update for libxstream-java (DSA 5004-1)
  • 180124 Debian Security Update for libxstream-java (CVE-2021-29505)
  • 239481 Red Hat Update for xstream (RHSA-2021:2683)
  • 257097 CentOS Security Update for xstream (CESA-2021:2683)
  • 281980 Fedora Security Update for xstream (FEDORA-2021-d894ca87dc)
  • 281981 Fedora Security Update for xstream (FEDORA-2021-fbad11014a)
  • 352501 Amazon Linux Security Advisory for xstream: ALAS2-2021-1698
  • 375827 XStream Arbitrary Code Execution And Multiple vulnerabilities
  • 377183 Alibaba Cloud Linux Security Update for xstream (ALINUX2-SA-2021:0043)
  • 730168 Atlassian Jira Server And Data Center Multiple Security Vulnerabilities (JRASERVER-72669, JRASERVER-72575, JRASERVER-72597)
  • 750658 SUSE Enterprise Linux Security Update for xstream (SUSE-SU-2021:1995-1)
  • 750718 OpenSUSE Security Update for xstream (openSUSE-SU-2021:0911-1)
  • 750779 OpenSUSE Security Update for xstream (openSUSE-SU-2021:1995-1)
  • 980137 Java (maven) Security Update for com.thoughtworks.xstream:xstream (GHSA-7chv-rrw6-w6fc)

Exploit/POC from Github

PoC for exploiting CVE-2021-29505

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux10.0AllAllAll
Operating
System
DebianDebian Linux11.0AllAllAll
Operating
System
DebianDebian Linux9.0AllAllAll
Operating
System
FedoraprojectFedora33AllAllAll
Operating
System
FedoraprojectFedora34AllAllAll
Operating
System
FedoraprojectFedora35AllAllAll
ApplicationNetappSnapmanager-AllAllAll
ApplicationNetappSnapmanager-AllAllAll
ApplicationOracle*14.3.0AllAllAll
ApplicationOracleBanking Cash Management14.2AllAllAll
ApplicationOracleBanking Cash Management14.3AllAllAll
ApplicationOracleBanking Cash Management14.5AllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.2.0AllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.3.0AllAllAll
ApplicationOracleBanking Corporate Lending Process Management14.5.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.2.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.3.0AllAllAll
ApplicationOracleBanking Credit Facilities Process Management14.5.0AllAllAll
ApplicationOracleBanking Supply Chain Finance14.2.0AllAllAll
ApplicationOracleBanking Trade Finance Process Management14.5.0AllAllAll
ApplicationOracleBusiness Activity Monitoring11.1.1.9.0AllAllAll
ApplicationOracleBusiness Activity Monitoring12.2.1.3.0AllAllAll
ApplicationOracleBusiness Activity Monitoring12.2.1.4.0AllAllAll
ApplicationOracleCommunications Brm - Elastic Charging Engine11.3AllAllAll
ApplicationOracleCommunications Brm - Elastic Charging Engine12.0AllAllAll
ApplicationOracleCommunications Unified Inventory Management7.3.4AllAllAll
ApplicationOracleCommunications Unified Inventory Management7.3.5AllAllAll
ApplicationOracleCommunications Unified Inventory Management7.4.0AllAllAll
ApplicationOracleCommunications Unified Inventory Management7.4.1AllAllAll
ApplicationOracleCommunications Unified Inventory Management7.4.2AllAllAll
ApplicationOracleEnterprise Manager Ops Center12.4.0.0AllAllAll
ApplicationOracleRetail Xstore Point Of Service16.0.6AllAllAll
ApplicationOracleRetail Xstore Point Of Service17.0.4AllAllAll
ApplicationOracleRetail Xstore Point Of Service18.0.3AllAllAll
ApplicationOracleRetail Xstore Point Of Service19.0.2AllAllAll
ApplicationOracleRetail Xstore Point Of Service20.0.1AllAllAll
ApplicationOracleWebcenter Portal12.2.1.3.0AllAllAll
ApplicationOracleWebcenter Portal12.2.1.4.0AllAllAll
ApplicationOracleWebcenter Sites12.2.1.3.0AllAllAll
ApplicationOracleWebcenter Sites12.2.1.4.0AllAllAll
ApplicationXstream ProjectXstreamAllAllAllAll
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*:
  • cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*:
  • cpe:2.3:a:oracle:*:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_cash_management:14.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_cash_management:14.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_cash_management:14.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:business_activity_monitoring:11.1.1.9.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @the_yellow_fall CVE-2021-29505: XStream Remote Command Execution Vulnerability Alert meterpreter.org/cve-2021-29505… #info #news #tech 2021-05-17 07:42:45
Twitter Icon @morodog #News CVE-2021-29505: XStream Remote Command Execution Vulnerability Alert: On May 17, 2021,  XStream issues an ale… twitter.com/i/web/status/1… 2021-05-17 17:16:04
Twitter Icon @morodog CVE-2021-29505: XStream Remote Command Execution Vulnerability Alert: On May 17, 2021,  XStream issues an alert abo… twitter.com/i/web/status/1… 2021-05-17 21:15:09
Twitter Icon @morodog CVE-2021-29505: XStream Remote Command Execution Vulnerability Alert: On May 17, 2021,  XStream issues an alert abo… twitter.com/i/web/status/1… 2021-05-19 07:42:14
Twitter Icon @CVEreport CVE-2021-29505 : ### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands… twitter.com/i/web/status/1… 2021-05-28 21:13:38
Reddit Logo Icon /r/netcve CVE-2021-29505 2021-05-28 21:41:16
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report