CVE-2021-21347

Source
https://cve.org/CVERecord?id=CVE-2021-21347
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-21347.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-21347
Aliases
Downstream
Related
Published
2021-03-23T00:15:13.023Z
Modified
2026-02-11T14:28:56.629237Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.

References

Affected packages

Git / github.com/apache/jmeter

Affected ranges

Type
GIT
Repo
https://github.com/apache/jmeter
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*
5.2-rc4
rel/v5.*
rel/v5.2
rel/v5.2.1
rel/v5.3
rel/v5.4
rel/v5.4.1
rel/v5.5
rel/v5.6
rel/v5.6.1
rel/v5.6.2
rel/v5.6.3
v5.*
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2.1-rc1
v5.2.1-rc4
v5.2.1-rc5
v5.3-rc1
v5.4-rc1
v5.4-rc2
v5.4.1-rc1
v5.4.1-rc2
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.6-rc1
v5.6.1-rc2
v5.6.2-rc1
v5.6.3-rc1
v5.6.3-rc2
Other
v5_2_RC1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-21347.json"