CVE-2013-7285
Published at:
-
15-05-2019 07:29
Last modified:
-
25-04-2022 03:15
Total changes:
-
3
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
9.8
Base score
3.9
5.9
Exploitability score
Impact score
Verification logic
Reference
- https://x-stream.github.io/CVE-2013-7285.html
- [xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper-Mailing List, Third Party Advisory
- [xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper-Mailing List, Third Party Advisory
- [oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream-Mailing List, Third Party Advisory
- http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html
- [activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar-Third Party Advisory
- [activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.-Third Party Advisory
- https://www.oracle.com/security-alerts/cpuoct2020.html
- http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html
Keywords