First published: Fri Jan 10 2014(Updated: )
It was found that XStream would deserialize arbitrary user-supplied XML content, representing objects of any type. A remote attacker able to pass XML to XStream could use this flaw to perform a variety of attacks, including remote code execution in the context of the server running the XStream application.
Affected Software | Affected Version | How to fix |
---|---|---|
XStream |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1051277 has a high severity rating due to the potential for remote code execution.
To resolve REDHAT-BUG-1051277, upgrade XStream to the latest version that includes a patch for this vulnerability.
REDHAT-BUG-1051277 can enable various attacks including remote code execution, data manipulation, and denial of service.
The affected software for REDHAT-BUG-1051277 is XStream.
REDHAT-BUG-1051277 allows exploitation through deserialization of arbitrary user-supplied XML, enabling attackers to control the server environment.