# XStream易受远程命令执行攻击
## 概述
XStream 是一款用于将 Java 对象序列化为 XML 并逆向转换的软件。在 XStream 1.4.17 之前的版本中存在一个漏洞,允许远程攻击者通过操纵处理的输入流来执行主机上的命令。
## 影响版本
- XStream 1.4.17 之前的版本
## 细节
该漏洞允许可访问输入流的远程攻击者执行主机上的命令。但遵循建议配置 XStream 安全框架并限定白名单仅包含最小必需类型的用户不受影响。
## 影响
- 允许远程命令执行
- 受影响版本已在 1.4.17 中修复
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | 对CVE-2021-29505进行复现,并分析学了下Xstream反序列化过程 | https://github.com/MyBlackManba/CVE-2021-29505 | POC详情 |
2 | XStream before 1.4.17 is susceptible to remote code execution. An attacker can execute commands of the host by manipulating the processed input stream, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-29505.yaml | POC详情 |
3 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/XStream%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-29505.md | POC详情 |
4 | https://github.com/vulhub/vulhub/blob/master/xstream/CVE-2021-29505/README.md | POC详情 |
标题: Add description of CVE-2021-29505 and bug fix. · x-stream/xstream@f0c4a8d · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: [GitHub] [jmeter] sseide opened a new pull request #667: update x-stream to 1.4.17 (from 1.4.16)-Apache Mail Archives -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: [SECURITY] Fedora 33 Update: xstream-1.4.18-2.fc33 - package-announce - Fedora mailing-lists -- 🔗来源链接
标签: x_refsource_MISC
标题: [SECURITY] Fedora 35 Update: xstream-1.4.18-2.fc35 - package-announce - Fedora mailing-lists -- 🔗来源链接
标签: x_refsource_MISC
标题: [SECURITY] Fedora 34 Update: xstream-1.4.18-2.fc34 - package-announce - Fedora mailing-lists -- 🔗来源链接
标签: x_refsource_MISC