XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.
{ "vanir_signatures": [ { "deprecated": false, "id": "CVE-2021-29505-01e2ea1b", "signature_version": "v1", "digest": { "length": 897.0, "function_hash": "55529827059998388985835589218509171525" }, "signature_type": "Function", "target": { "function": "setupSecurity", "file": "xstream/src/java/com/thoughtworks/xstream/XStream.java" }, "source": "https://github.com/x-stream/xstream/commit/f0c4a8d861b68ffc3119cfbbbd632deee624e227" }, { "deprecated": false, "id": "CVE-2021-29505-734e63e4", "signature_version": "v1", "digest": { "line_hashes": [ "228053600362383738383378574221655207960", "315590729455584714180717487731983745448", "257878284676754907993801838307504860032", "231257142268735163893318086460227527786", "183765047426471769504861481430198288414", "161229857215197968276439161291882057455", "304544354710807799641371135251598970303", "264527588790798306887948232623981151266", "87393381625111131561526952720266719235", "130273361020895782069120355560557146251", "154828802101872288206305236334275778530", "259768556357375405967654864082038448418", "74605625453746711180847749475408939299", "204716482209653724790252231288128673691" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "xstream/src/java/com/thoughtworks/xstream/XStream.java" }, "source": "https://github.com/x-stream/xstream/commit/f0c4a8d861b68ffc3119cfbbbd632deee624e227" } ] }