XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a - Patch, Third Party Advisory | |
References | () https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2 - Mitigation, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9%40%3Ccommits.camel.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3%40%3Cissues.activemq.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210409-0004/ - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4811 - Third Party Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Not Applicable, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Not Applicable, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory | |
References | () https://x-stream.github.io/CVE-2020-26217.html - Exploit, Mitigation, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 8.0 |
12 May 2022, 14:47
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Not Applicable, Third Party Advisory |
20 Apr 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Mar 2022, 20:35
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Not Applicable, Third Party Advisory |
07 Feb 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Dec 2021, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_supply_chain_finance:14.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_trade_finance_process_management:14.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_cash_management:14.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_virtual_account_managemen:14.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_cash_management:14.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_supply_chain_finance:14.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_supply_chain_finance:14.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_virtual_account_managemen:14.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_cash_management:14.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_virtual_account_managemen:14.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_trade_finance_process_management:14.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_activity_monitoring:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3:*:*:*:*:*:*:* |
|
References | (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E - Mailing List, Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
20 Oct 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Oct 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-11-16 21:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26217
Mitre link : CVE-2020-26217
CVE.ORG link : CVE-2020-26217
JSON object : View
Products Affected
oracle
- banking_credit_facilities_process_management
- banking_corporate_lending_process_management
- banking_trade_finance_process_management
- endeca_information_discovery_studio
- banking_supply_chain_finance
- communications_policy_management
- banking_virtual_account_management
- banking_platform
- retail_xstore_point_of_service
- banking_cash_management
- business_activity_monitoring
xstream_project
- xstream
netapp
- snapmanager
debian
- debian_linux
apache
- activemq
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')