.. / CVE-2020-26217

Exploit for XStream <1.4.14 - Remote Code Execution (CVE-2020-26217)

Description:

XStream before 1.4.14 is susceptible to remote code execution. An attacker can run arbitrary shell commands by manipulating the processed input stream, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. Users who rely on blocklists are affected.

Nuclei Template

View the template here CVE-2020-26217.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-26217.yaml
Copy

References:

https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E
https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a
https://nvd.nist.gov/vuln/detail/cve-2020-26217
https://x-stream.github.io/CVE-2020-26217.html
https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2