CVE-2020-26217
Published: 16 November 2020
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
Priority
Status
Package | Release | Status |
---|---|---|
libxstream-java Launchpad, Ubuntu, Debian |
bionic |
Released
(1.4.11.1-1~18.04.1)
|
focal |
Released
(1.4.11.1-1ubuntu0.1)
|
|
groovy |
Released
(1.4.11.1-2ubuntu0.1)
|
|
hirsute |
Not vulnerable
(1.4.14-1)
|
|
impish |
Not vulnerable
(1.4.14-1)
|
|
jammy |
Not vulnerable
(1.4.14-1)
|
|
kinetic |
Not vulnerable
(1.4.14-1)
|
|
precise |
Does not exist
|
|
trusty |
Needs triage
|
|
upstream |
Needs triage
|
|
xenial |
Needs triage
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26217
- https://x-stream.github.io/CVE-2020-26217.html
- https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2
- https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a
- https://ubuntu.com/security/notices/USN-4714-1
- https://ubuntu.com/security/notices/USN-4943-1
- NVD
- Launchpad
- Debian