CVE-2021-39150
Publication date 23 August 2021
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| libxstream-java | ||
| 22.04 LTS jammy |
Not affected
|
|
| 20.04 LTS focal |
Fixed 1.4.11.1-1ubuntu0.3
|
|
| 18.04 LTS bionic |
Fixed 1.4.11.1-1+deb10u4build0.18.04.1
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty |
Not affected
|
Notes
sahnaseredini
for `trusty` and `xenial`, the code is not present and the available pocs cannot be exploited
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | Low |
| User interaction | None |
| Scope | Changed |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5946-1
- XStream vulnerabilities
- 13 March 2023