BDU:2021-05940

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

9.1critical3.x
0246810

CVSS Score: 9.1/10

All CVSS Scores

CVSS 3.x
9.1

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

CVSS 2.0
9.0

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Description

Уязвимость Java-библиотеки Xstream для преобразования объектов в форматы XML или JSON связана с неограниченной загрузкой файлов опасного типа. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, загружать и выполнять произвольный код с удаленного хоста путем манипулирования обработанным входным потоком данных

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

bdu

Related Vulnerabilities

Recommendations

Source: bdu

Использование рекомендаций:
Для xstream:
https://x-stream.github.io/CVE-2021-21351.html
https://x-stream.github.io/security.html#workaround

Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2021-21351
https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html

Для Apache:
https://lists.apache.org/thread/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3cusers.activemq.apache.org%3e
https://issues.apache.org/jira/browse/AMQ-7426

Для Ubuntu:
https://ubuntu.com/security/CVE-2021-21351
https://ubuntu.com/security/notices/USN-4943-1

Для Fedora:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/

Для программных продуктов Oracle Corp.:
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html

Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2021-21351

Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2021-21351.html

Для McAfee Inc.:
https://docs.mcafee.com/ru-RU/bundle/web-gateway-8.2.x-release-notes/page/GUID-66AC8C57-9C6E-4785-994A-641F156C0E0B.html

Для ОС ОН «Стрелец»:
Обновление программного обеспечения libxstream-java до версии 1.4.11.1-1+deb9u5

URL: https://bdu.fstec.ru/vul/2021-05940

Vulnerable Software (585)

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: red hat enterprise linux 7

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: ubuntu 18.04 LTS

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: opensuse leap 15.2

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: fedora 33

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: ubuntu 21.04

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: fedora 34

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: opensuse leap 15.3

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: strelets *

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: debian gnu/linux 9

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: ubuntu 20.04 LTS

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: ubuntu 20.10

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: fedora 35

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: opensuse tumbleweed *

Trait:
{  "version_end_excluding": "5.17.0"}

Source: bdu

Type: Configuration

Vendor: mcafee inc.

Product: mcafee web gateway

Operating System: red hat enterprise linux 7

Trait:
{  "version_end_excluding": "8.2.22"}

Source: bdu

Type: Configuration

Vendor: mcafee inc.

Product: mcafee web gateway

Operating System: ubuntu 18.04 LTS

Trait:
{  "version_end_excluding": "8.2.22"}

Source: bdu

Type: Configuration

Vendor: mcafee inc.

Product: mcafee web gateway

Operating System: opensuse leap 15.2

Trait:
{  "version_end_excluding": "8.2.22"}

Source: bdu

Type: Configuration

Vendor: mcafee inc.

Product: mcafee web gateway

Operating System: fedora 33

Trait:
{  "version_end_excluding": "8.2.22"}

Source: bdu

Type: Configuration

Vendor: mcafee inc.

Product: mcafee web gateway

Operating System: ubuntu 21.04

Trait:
{  "version_end_excluding": "8.2.22"}

Source: bdu

Type: Configuration

Vendor: mcafee inc.

Product: mcafee web gateway

Operating System: fedora 34

Trait:
{  "version_end_excluding": "8.2.22"}

Source: bdu

Type: Configuration

Vendor: mcafee inc.

Product: mcafee web gateway

Operating System: opensuse leap 15.3

Trait:
{  "version_end_excluding": "8.2.22"}

Source: bdu