{
  "threat_severity" : "Important",
  "public_date" : "2021-03-12T00:00:00Z",
  "bugzilla" : {
    "description" : "XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry",
    "id" : "1942558",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1942558"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-502",
  "details" : [ "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.", "A flaw was found in xstream. A remote attacker, who has sufficient rights, can execute commands of the host by manipulating the processed input stream. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." ],
  "statement" : "OpenShift Container Platform (OCP) delivers Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, OCP Jenkins package is not affected by this flaw.\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security",
  "affected_release" : [ {
    "product_name" : "Red Hat Data Grid 8.2.0",
    "release_date" : "2021-05-26T00:00:00Z",
    "advisory" : "RHSA-2021:2139",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:8",
    "package" : "xstream",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2021-04-26T00:00:00Z",
    "advisory" : "RHSA-2021:1354",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "xstream-0:1.3.1-13.el7_9"
  }, {
    "product_name" : "Red Hat Fuse 7.10",
    "release_date" : "2021-12-14T00:00:00Z",
    "advisory" : "RHSA-2021:5134",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7",
    "package" : "xstream",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Integration",
    "release_date" : "2021-12-02T00:00:00Z",
    "advisory" : "RHSA-2021:4918",
    "cpe" : "cpe:/a:redhat:integration:1"
  }, {
    "product_name" : "Red Hat Integration Camel Quarkus 1",
    "release_date" : "2021-11-23T00:00:00Z",
    "advisory" : "RHSA-2021:4767",
    "cpe" : "cpe:/a:redhat:camel_quarkus:2.2"
  }, {
    "product_name" : "RHDM 7.11.0",
    "release_date" : "2021-06-17T00:00:00Z",
    "advisory" : "RHSA-2021:2476",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_brms_platform:7.11",
    "package" : "xstream",
    "impact" : "low"
  }, {
    "product_name" : "RHPAM 7.11.0",
    "release_date" : "2021-06-17T00:00:00Z",
    "advisory" : "RHSA-2021:2475",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.11",
    "package" : "xstream",
    "impact" : "low"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat BPM Suite 6",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_bpms_platform"
  }, {
    "product_name" : "Red Hat Integration Camel K 1",
    "fix_state" : "Affected",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:integration:1",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Integration Camel Quarkus 1",
    "fix_state" : "Not affected",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:camel_quarkus:2",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat JBoss A-MQ 6",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_amq:6",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat JBoss BRMS 5",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_brms_platform:5"
  }, {
    "product_name" : "Red Hat JBoss BRMS 6",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_brms_platform:6"
  }, {
    "product_name" : "Red Hat JBoss Data Grid 7",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:7",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat JBoss Data Virtualization 6",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_data_virtualization:6"
  }, {
    "product_name" : "Red Hat JBoss Fuse 6",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_fuse:6",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat JBoss Fuse Service Works 6",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_fuse_service_works:6"
  }, {
    "product_name" : "Red Hat JBoss SOA Platform 5",
    "fix_state" : "Out of support scope",
    "package_name" : "xstream",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_soa_platform:5"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Not affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "jenkins",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2021-21345\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-21345" ],
  "name" : "CVE-2021-21345",
  "csaw" : false
}