漏洞信息详情
XStream 代码注入漏洞
- CNNVD编号:CNNVD-201907-1192
- 危害等级: 超危
- CVE编号: CVE-2019-10173
- 漏洞类型: 代码注入
- 发布时间: 2019-07-23
- 威胁类型: 远程
- 更新时间: 2021-07-21
- 厂 商:
- 漏洞来源: Red Hat
漏洞简介
XStream是XStream(Xstream)团队的一个轻量级的、简单易用的开源Java类库,它主要用于将对象序列化成XML(jsON)或反序列化为对象。
xstream 1.4.10版本中存在代码注入漏洞。该漏洞源于网络系统或产品的代码开发过程中存在设计或实现不当的问题。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://x-stream.github.io/
参考网址
来源:MISC
链接:http://x-stream.github.io/changes.HTML#1.4.11
来源:CONFIRM
链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10173
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:4352
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2020:0727
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3892
来源:N/A
链接:https://www.oracle.com/security-alerts/cpuapr2020.HTML
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujan2021.HTML
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2020:0445
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2020.HTML
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuApr2021.HTML
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3892
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/887115
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2020:0445
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:1823
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:4352
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-cve-2019-10173cve-2019-10173-xstream-api-if-the-security-framework-has-not-been-initialized-it-may-allow-a-remote-attacker-to-run-arbitrary-shell-commands/
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2021.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2734/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1076637
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4080/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4416/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4737/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0832/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156241/Red-Hat-Security-Advisory-2020-0445-01.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4255/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4332/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/153724/Red-Hat-Security-Advisory-2019-1823-01.HTML
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpuoct2020.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0450/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/XStream-API-code-execution-via-Deserialization-30921
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155352/Red-Hat-Security-Advisory-2019-3892-01.HTML
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1109925
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155728/Red-Hat-Security-Advisory-2019-4352-01.HTML
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3743/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156628/Red-Hat-Security-Advisory-2020-0727-01.HTML
受影响实体
暂无
补丁
暂无
![weinxin](http://zone.ci/zone_ci_images/zone.ci.png)
评论