• 公告ID (KylinSec-SA-2022-2439)

摘要:

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream s security framework with a whitelist limited to the minimal required types. If you rely on XStream s default blacklist of the Security Framework, you will have to use at least version 1.4.16.

安全等级: Low

公告ID: KylinSec-SA-2022-2439

发布日期: 2022年9月30日

关联CVE: CVE-2021-21342  

  • 详细介绍

1. 漏洞描述

   

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream s security framework with a whitelist limited to the minimal required types. If you rely on XStream s default blacklist of the Security Framework, you will have to use at least version 1.4.16.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-21342 KY3.4-4A mysql Unaffected
CVE-2021-21342 KY3.4-5 mysql Unaffected
CVE-2021-21342 KY3.5.1 mysql Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-2438 下一篇:KylinSec-SA-2022-2440