CVE-2020-26217

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.

References

https://x-stream.github.io/CVE-2020-26217.html

https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a

https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2

https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html

https://www.debian.org/security/2020/dsa-4811

https://lists.apache.org/thread.html/[email protected]%3Cissues.activemq.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.activemq.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cissues.activemq.apache.org%3E

https://security.netapp.com/advisory/ntap-20210409-0004/

https://www.oracle.com/security-alerts/cpuApr2021.html

https://www.oracle.com//security-alerts/cpujul2021.html

https://lists.apache.org/thread.html/[email protected]%3Ccommits.camel.apache.org%3E

https://www.oracle.com/security-alerts/cpuoct2021.html

Details

Source: MITRE

Published: 2020-11-16

Updated: 2021-12-03

Type: CWE-78

Risk Information

CVSS v2

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

CVSS v3

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*

cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*

Configuration 4

OR

cpe:2.3:a:apache:activemq:5.15.4:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:oracle:banking_cash_management:14.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_cash_management:14.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_cash_management:14.5:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_supply_chain_finance:14.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_supply_chain_finance:14.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_supply_chain_finance:14.5:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_virtual_account_managemen:14.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_virtual_account_managemen:14.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:banking_virtual_account_managemen:14.5:*:*:*:*:*:*:*

cpe:2.3:a:oracle:business_activity_monitoring:11.1.1.9.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*

cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*

cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
154605NewStart CGSL CORE 5.04 / MAIN 5.04 : xstream Vulnerability (NS-SA-2021-0095)NessusNewStart CGSL Local Security Checks
high
154468NewStart CGSL CORE 5.05 / MAIN 5.05 : xstream Vulnerability (NS-SA-2021-0179)NessusNewStart CGSL Local Security Checks
high
149408Ubuntu 18.04 LTS / 20.04 LTS / 20.10 / 21.04 : XStream vulnerabilities (USN-4943-1)NessusUbuntu Local Security Checks
high
145542Ubuntu 18.04 LTS / 20.04 LTS : XStream vulnerabilities (USN-4714-1)NessusUbuntu Local Security Checks
high
145450Amazon Linux 2 : xstream (ALAS-2021-1593)NessusAmazon Linux Local Security Checks
high
145442Scientific Linux Security Update : xstream on SL7.x (noarch) (2021:0162)NessusScientific Linux Local Security Checks
high
145441CentOS 7 : xstream (CESA-2021:0162)NessusCentOS Local Security Checks
high
145314openSUSE Security Update : xstream (openSUSE-2021-140)NessusSuSE Local Security Checks
high
145080Oracle Linux 7 : xstream (ELSA-2021-0162)NessusOracle Linux Local Security Checks
high
145067RHEL 7 : xstream (RHSA-2021:0162)NessusRed Hat Local Security Checks
high
144311Debian DSA-4811-1 : libxstream-java - security updateNessusDebian Local Security Checks
high
143386Debian DLA-2471-1 : libxstream-java security updateNessusDebian Local Security Checks
high