9.3

CVE-2020-26217

Exploit

XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.

Data is provided by the National Vulnerability Database (NVD)
XstreamXstream Version < 1.4.14
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
NetappSnapmanager SwPlatformsap
NetappSnapmanager Version- Update- SwPlatformoracle
ApacheActivemq Version < 5.15.14
ApacheActivemq Version5.16.0
OracleBanking Platform Version2.4.0
OracleBanking Platform Version2.7.1
OracleBanking Platform Version2.9.0
OracleBusiness Activity Monitoring Version11.1.1.9.0
OracleBusiness Activity Monitoring Version12.2.1.3.0
OracleBusiness Activity Monitoring Version12.2.1.4.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 93.01% 0.998
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
security-advisories@github.com 8 1.3 6
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

https://www.oracle.com/security-alerts/cpuapr2022.html
Third Party Advisory
Not Applicable
https://www.oracle.com/security-alerts/cpujan2022.html
Third Party Advisory
Not Applicable
https://x-stream.github.io/CVE-2020-26217.html
Vendor Advisory
Exploit
Mitigation