### [CVE-2021-29505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29505) ![](https://img.shields.io/static/v1?label=Product&message=xstream&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%201.4.17%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%3A%20Deserialization%20of%20Untrusted%20Data&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brightgreen) ### Description XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuapr2022.html - https://www.oracle.com/security-alerts/cpujan2022.html - https://www.oracle.com/security-alerts/cpujul2022.html - https://www.oracle.com/security-alerts/cpuoct2021.html #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/ARPSyndicate/cvemon - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet - https://github.com/BrittanyKuhn/javascript-tutorial - https://github.com/Coldplay1517/Middleware-Vulnerability-detection-master - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/MyBlackManba/CVE-2021-29505 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/SexyBeast233/SecBooks - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/TrojanAZhen/Self_Back - https://github.com/WhooAmii/POC_to_review - https://github.com/Whoopsunix/PPPVULNS - https://github.com/XiaomingX/awesome-poc-for-red-team - https://github.com/apachecn-archive/Middleware-Vulnerability-detection - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/cuijiung/xstream-CVE-2021-29505 - https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet - https://github.com/n0-traces/cve_monitor - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/soosmile/POC - https://github.com/superfish9/pt - https://github.com/trhacknon/Pocingit - https://github.com/x-poc/xstream-poc - https://github.com/zecool/cve