XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
|Base Score:||8.5||Base Metrics:||AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H|
|Access Vector:||Network||Attack Complexity:||High|
|Privileges Required:||Low||User Interaction:||None|
|Integrity Impact:||High||Availability Impact:||High|
|Oracle Linux version 7 (xstream)||ELSA-2021-3956||2021-10-25|
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team