CVE-2020-26217
Published: 16 November 2020
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
libxstream-java Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(1.4.14-1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Needs triage
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1.4.11.1-1ubuntu0.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.4.11.1-1~18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needs triage
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Needs triage
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26217
- https://x-stream.github.io/CVE-2020-26217.html
- https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2
- https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a
- https://usn.ubuntu.com/usn/usn-4714-1
- NVD
- Launchpad
- Debian