Miggo Logo

CVE-2021-21344: XStream is vulnerable to an Arbitrary Code Execution attack

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.96208%
Published
3/22/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.thoughtworks.xstream:xstreammaven< 1.4.161.4.16

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis focuses on XStream's deserialization process and its security framework. The identified functions are directly related to how XStream handles untrusted input and config.php its security settings. The primary vulnerable functions are those involved in the deserialization process, such as 'unmarshal' and 'fromXML', as they directly process potentially malicious input.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** vuln*r**ility m*y *llow * r*mot* *tt**k*r to lo** *n* *x**ut* *r*itr*ry *o** *rom * r*mot* *ost only *y m*nipul*tin* t** pro**ss** input str**m. No us*r is *****t**, w*o *ollow** t** r**omm*n**tion to s*tup XStr**m's s**urity *r*m*work

Reasoning

T** *n*lysis *o*us*s on XStr**m's **s*ri*liz*tion pro**ss *n* its s**urity *r*m*work. T** i**nti*i** *un*tions *r* *ir**tly r*l*t** to *ow XStr**m **n*l*s untrust** input *n* `*on*i*.p*p` its s**urity s*ttin*s. T** prim*ry vuln*r**l* *un*tions *r* t*