.. / CVE-2021-39152

Exploit for XStream <1.4.18 - Server-Side Request Forgery (CVE-2021-39152)

Description:

XStream before 1.4.18 is susceptible to server-side request forgery. An attacker can request data from internal resources that are not publicly available by manipulating the processed input stream with a Java runtime version 14 to 8. This makes it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.

Nuclei Template

View the template here CVE-2021-39152.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-39152.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/cve-2021-39152
https://security.netapp.com/advisory/ntap-20210923-0003/
https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2
https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html
https://x-stream.github.io/CVE-2021-39152.html