Miggo Logo

CVE-2020-26258:
Server-Side Forgery Request can be activated unmarshalling with XStream

6.3

CVSS Score

Basic Information

EPSS Score
-
Published
12/21/2020
Updated
1/15/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.thoughtworks.xstream:xstreammaven< 1.4.151.4.15

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from XStream's deserialization of specific Java classes that enable SSRF/RCE vectors. The advisory explicitly lists classes like NativeString, ImageIO$ContainsFilter, and ProcessBuilder in its workarounds, indicating their converters are vulnerable when not properly restricted. These classes' deserialization handlers allow attacker-controlled input to trigger unintended network requests or command execution. While exact XStream function names aren't provided, the classes themselves are the root cause via their default converters.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** vuln*r**ility m*y *llow * r*mot* *tt**k*r to r*qu*st **t* *rom int*rn*l r*sour**s t**t *r* not pu*li*ly *v*il**l* only *y m*nipul*tin* t** pro**ss** input str**m. ### P*t***s I* you r*ly on XStr**m's ****ult *l**klist o* t** [S**urity

Reasoning

T** vuln*r**ility st*ms *rom XStr**m's **s*ri*liz*tion o* sp**i*i* J*v* *l*ss*s t**t *n**l* SSR*/R** v**tors. T** **visory *xpli*itly lists *l*ss*s lik* N*tiv*Strin*, Im***IO$*ont*ins*ilt*r, *n* Pro**ss*uil**r in its work*roun*s, in*i**tin* t**ir *on