8.8
CVSSv3

CVE-2020-26217

Published: 16/11/2020 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 830
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote malicious user to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xstream project xstream

debian debian linux 9.0

debian debian linux 10.0

netapp snapmanager

netapp snapmanager -

apache activemq 5.15.4

oracle banking platform 2.4.0

oracle communications policy management 12.5.0

oracle banking platform 2.7.1

oracle banking platform 2.9.0

oracle banking virtual account management 14.3.0

oracle business activity monitoring 12.2.1.3.0

oracle business activity monitoring 11.1.1.9.0

oracle business activity monitoring 12.2.1.4.0

oracle retail xstore point of service 16.0.6

oracle retail xstore point of service 17.0.4

oracle retail xstore point of service 18.0.3

oracle retail xstore point of service 19.0.2

oracle banking virtual account management 14.2.0

oracle banking virtual account management 14.5.0

oracle banking cash management 14.2

oracle banking cash management 14.3

oracle banking cash management 14.5

oracle endeca information discovery studio 3.2.0.0

oracle banking trade finance process management 14.2

oracle banking trade finance process management 14.3

oracle banking trade finance process management 14.5

oracle banking credit facilities process management 14.2

oracle banking credit facilities process management 14.3

oracle banking credit facilities process management 14.5

oracle banking corporate lending process management 14.2

oracle banking corporate lending process management 14.3

oracle banking corporate lending process management 14.5

oracle banking supply chain finance 14.2

oracle banking supply chain finance 14.3

oracle banking supply chain finance 14.5

Vendor Advisories

Synopsis Important: Red Hat Process Automation Manager 791 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat Process Automation ManagerRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scor ...
Synopsis Moderate: Red Hat Data Grid 811 security update Type/Severity Security Advisory: Moderate Topic A security update for Red Hat Data Grid is now availableRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, ...
Synopsis Important: Red Hat JBoss Fuse/A-MQ 63 R18 security and bug fix update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Fuse 63 and Red Hat JBoss A-MQ 63Red Hat Product Security has rated this update as having a security impact of Important A Common ...
Synopsis Important: Red Hat Decision Manager 791 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat Decision ManagerRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) ba ...
Synopsis Important: xstream security update Type/Severity Security Advisory: Important Topic An update for xstream is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
It was discovered that the default blacklist of XStream, a Java library to serialise objects to XML and back again, was vulnerable to the execution of arbitrary shell commands by manipulating the processed input stream For additional defense-in-depth it is recommended to switch to the whitelist approach of XStream's security framework For additio ...
A flaw was found in xstream An unsafe deserialization of user-supplied XML, in conjunction with relying on the default deny list, allows a remote attacker to perform a variety of attacks including a remote code execution of arbitrary code in the context of the JVM running the XStream application The highest threat from this vulnerability is to da ...

Github Repositories

Learn Java Security Vulneriability 项目介绍 作为Java安全初学者,经常在搭建调试环境时遇到各类问题(依赖包等等)。因此将自己调试所用的项目环境整理在此,通过IDEA可以方便的运行各个漏洞环境进行调试分析 漏洞环境列表 dubbo f5 BIGIP fastjson mysql-connector-java rce & fileread rmi shiro auth bypa

CVE-2020-26217 && XStream RCE

Description XStream can be used for Remote Code Execution Influence Xstream <= 1413 Environment pomxml <!-- mvnrepositorycom/artifact/comthoughtworksxstream/xstream --> <dependencies> <dependency> <groupId>comthoughtworksxstream</groupId> <

XStream相关漏洞POC及分析复现环境

XStream相关漏洞 XStream今年出的漏洞有 XStream远程代码执行漏洞(CVE-2020-26217)、XStream服务端请求伪造漏洞(CVE-2020-26258)、XStream任意文件删除漏洞(CVE-2020-26259),这里对这些漏洞POC及分析复现环境进行整理。 POC为均以CVE编号命令的xml文件,在Demojava中引用即可触发。 CVE-2020-26217 XStream 14

CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights.

CVE-2020-26259 CVE-2020-26259: XStream(1414) is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights x-streamgithubio/CVE-2020-26259html XStream 1414 pomxml <!-- mvnrepositorycom/artifact/comthoughtworksxstream/xstream --> <dependencies&g

CVE-2020-26217 XStream RCE POC

CVE-2020-26217-XStream-RCE-POC eg package orgexample; import comthoughtworksxstreamXStream; import javaioIOException; public class CVE_2020_26217{ public static void main(String[] args) throws IOException{ XStream xStream = new XStream(); String payload = "<map>\n" + " <entry>\n" +

关于我 ⌨️ 就职于 @长亭科技 安全研发,擅长编写 Golang/Python/C/C++/Java 等多种语言 HelloWorld 安全研究,擅长 云安全/主机安全/Web安全 领域的弹计算器 公众号 Redteam101 部分文章 如何正确的 "手撕" Cobalt Strike 深度分析CobaltStrike(一)—— Beacon生成流程及Shellcode分析 XStream