CVE-2019-10173

Scores

EPSS

0.928high92.8%
0%20%40%60%80%100%

Percentile: 92.8%

CVSS

7.3high3.x
0246810

CVSS Score: 7.3/10

All CVSS Scores

CVSS 3.x
7.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285)

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-94

Related Vulnerabilities

Recommendations

Source: nvd

To install this update, do the following:
1. Download the Data Grid 7.3.3 server patch from the customer portal.2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.4. Restart Data Grid to ensure the changes take effect.

URL: https://access.redhat.com/errata/RHSA-2020:0727

Source: nvd

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link (you must log in to download the update).

URL: https://access.redhat.com/errata/RHSA-2020:0445

Vulnerable Software (21)

Type: Configuration

Product: libxstream-java

Operating System: debian

Trait:
{  "fixed": "1.4.11-1"}

Source: debian

Type: Configuration

Product: libxstream-java

Operating System: debian stretch 9

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: libxstream-java

Operating System: debian jessie 8

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: libxstream-java

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libxstream-java

Operating System: ubuntu disco 19.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libxstream-java

Operating System: ubuntu eoan 19.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libxstream-java

Operating System: ubuntu focal 20.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libxstream-java

Operating System: ubuntu groovy 20.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libxstream-java

Operating System: ubuntu hirsute 21.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libxstream-java

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: libxstream-java

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Vendor: *

Product: banking_platform

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: business_activity_monitoring

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: communications_billing_and_revenue_management_elastic_charging_engine

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: communications_diameter_signaling_router

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: communications_unified_inventory_management

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: endeca_information_discovery_studio

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: retail_xstore_point_of_service

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: utilities_framework

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: webcenter_portal

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.10.0",      "versionStartIncluding": "2.4.0",      "vulnerable": true...

Source: nvd