XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.
[
{
"signature_version": "v1",
"digest": {
"function_hash": "55529827059998388985835589218509171525",
"length": 897.0
},
"signature_type": "Function",
"target": {
"function": "setupSecurity",
"file": "xstream/src/java/com/thoughtworks/xstream/XStream.java"
},
"deprecated": false,
"id": "CVE-2021-29505-01e2ea1b",
"source": "https://github.com/x-stream/xstream/commit/f0c4a8d861b68ffc3119cfbbbd632deee624e227"
},
{
"signature_version": "v1",
"digest": {
"line_hashes": [
"228053600362383738383378574221655207960",
"315590729455584714180717487731983745448",
"257878284676754907993801838307504860032",
"231257142268735163893318086460227527786",
"183765047426471769504861481430198288414",
"161229857215197968276439161291882057455",
"304544354710807799641371135251598970303",
"264527588790798306887948232623981151266",
"87393381625111131561526952720266719235",
"130273361020895782069120355560557146251",
"154828802101872288206305236334275778530",
"259768556357375405967654864082038448418",
"74605625453746711180847749475408939299",
"204716482209653724790252231288128673691"
],
"threshold": 0.9
},
"signature_type": "Line",
"target": {
"file": "xstream/src/java/com/thoughtworks/xstream/XStream.java"
},
"deprecated": false,
"id": "CVE-2021-29505-734e63e4",
"source": "https://github.com/x-stream/xstream/commit/f0c4a8d861b68ffc3119cfbbbd632deee624e227"
}
]