CVE-2021-39139 (CNNVD-202108-1885)
中文标题:
XStream 代码问题漏洞
英文标题:
XStream is vulnerable to an Arbitrary Code Execution attack
漏洞描述
中文描述:
XStream是Xstream团队的一个轻量级的、简单易用的开源Java类库,它主要用于将对象序列化成XML(JSON)或反序列化为对象。 XStream 1.4.17及之前版本存在代码问题漏洞,远程攻击者可以通过操纵处理后的输入流,从远程主机加载和执行任意代码。
英文描述:
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| x-stream | xstream | < 1.4.18 | - | - |
cpe:2.3:a:x-stream:xstream:<_1.4.18:*:*:*:*:*:*:*
|
| xstream | xstream | * | - | - |
cpe:2.3:a:xstream:xstream:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 11.0 | - | - |
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 33 | - | - |
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 34 | - | - |
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
|
| fedoraproject | fedora | 35 | - | - |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
|
| netapp | snapmanager | - | - | - |
cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
|
| oracle | business_activity_monitoring | 12.2.1.4.0 | - | - |
cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*
|
| oracle | commerce_guided_search | 11.3.2 | - | - |
cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*
|
| oracle | communications_billing_and_revenue_management_elastic_charging_engine | 11.3 | - | - |
cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*
|
| oracle | communications_billing_and_revenue_management_elastic_charging_engine | 12.0 | - | - |
cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*
|
| oracle | communications_cloud_native_core_automated_test_suite | 1.9.0 | - | - |
cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
|
| oracle | communications_cloud_native_core_binding_support_function | 1.10.0 | - | - |
cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*
|
| oracle | communications_cloud_native_core_policy | 1.14.0 | - | - |
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.3.4 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.3.5 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.4.0 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.4.1 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*
|
| oracle | communications_unified_inventory_management | 7.4.2 | - | - |
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*
|
| oracle | retail_xstore_point_of_service | 16.0.6 | - | - |
cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*
|
| oracle | retail_xstore_point_of_service | 17.0.4 | - | - |
cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*
|
| oracle | retail_xstore_point_of_service | 18.0.3 | - | - |
cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*
|
| oracle | retail_xstore_point_of_service | 19.0.2 | - | - |
cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*
|
| oracle | retail_xstore_point_of_service | 20.0.1 | - | - |
cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*
|
| oracle | utilities_framework | 4.2.0.2.0 | - | - |
cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*
|
| oracle | utilities_framework | 4.2.0.3.0 | - | - |
cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*
|
| oracle | utilities_framework | 4.3.0.1.0 | - | - |
cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*
|
| oracle | utilities_framework | 4.3.0.6.0 | - | - |
cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*
|
| oracle | utilities_framework | 4.4.0.0.0 | - | - |
cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*
|
| oracle | utilities_framework | 4.4.0.2.0 | - | - |
cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*
|
| oracle | utilities_framework | 4.4.0.3.0 | - | - |
cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*
|
| oracle | utilities_testing_accelerator | 6.0.0.1.1 | - | - |
cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*
|
| oracle | webcenter_portal | 12.2.1.3.0 | - | - |
cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*
|
| oracle | webcenter_portal | 12.2.1.4.0 | - | - |
cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-39139 |
2025-11-11 15:21:03 | 2025-11-11 07:37:00 |
| NVD | nvd_CVE-2021-39139 |
2025-11-11 14:57:41 | 2025-11-11 07:45:18 |
| CNNVD | cnnvd_CNNVD-202108-1885 |
2025-11-11 15:10:42 | 2025-11-11 07:56:52 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-202108-1885
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 36
- data_sources: ['cve'] -> ['cve', 'nvd']