漏洞标题
通过XStream反序列化激活的服务器端伪造请求,可以访问任意URL引用的内网或本地主机上的资源数据流
漏洞描述信息
通过使用XStream反序列化激活服务器端伪造请求,可以访问任意URL的数据流,该URL引用内部网络或本地主机上的资源
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
漏洞类别
N/A
漏洞标题
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
漏洞描述信息
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
漏洞类别
可信数据的反序列化
漏洞标题
XStream 代码问题漏洞
漏洞描述信息
XStream是XStream(Xstream)团队的一个轻量级的、简单易用的开源Java类库,它主要用于将对象序列化成XML(JSON)或反序列化为对象。 XStream 1.4.16 之前版本存在代码问题漏洞,该漏洞源于WEB应用未充分验证请求是否来自可信用户。攻击者可利用该漏洞通过受影响客户端向服务器发送非预期的请求。
CVSS信息
N/A
漏洞类别
代码问题