Patch

CVE-2021-39144

with vRx

Vulnerability Overview
CVE Name
CVE-2021-39144
Severity
8.5
High
CVE Description
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected...
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected...
Show more
Show less
Latest Patch info
Patch Name
https://www.oracle.com/security-alerts/cpujul2022.html
Date
20.07.2022
Script
Script Type
Detection script
Introduction XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-39144 Detection Script Usage kali@kali:~$ python3 detection.py [*] Script Usage: python3 detection.py <target> [*] Example: python3 detection.py target.local kali@kali:~$ Detecting Vulnerable Targets kali@kali:~$ python3 detection.py vuln.target.local [+] The provided target seems to be vulnerable to CVE-2021-39144. Understanding the detection script The detection script works as follows: Scan the user-supplied arguments (to read the target). Send an HTTP PUT request to /api/2.0/services/usermgmt/password/1337 endpoint with the payload to trigger the payload (after deserialization of the supplied XML). Here's the XML payload sent to the target: <sorted-set> <string>foo</string> <dynamic-proxy> <interface>java.lang.Comparable</interface> <handler class="java.beans.EventHandler"> <target class="java.lang.ProcessBuilder"> <command> <string>bash</string> <string>-c</string> <string>sleep 5</string> </command> </target> <action>start</action> </handler> </dynamic-proxy> </sorted-set> The interesting part is: <command> <string>bash</string> <string>-c</string> <string>sleep 5</string> </command> The sleep 5 command is executed on the target if it is vulnerable. To detect vulnerable targets, if the response took more than 5 seconds, the target is reported to be potentially vulnerable. Otherwise, the target is reported to be potentially patched.
Introduction XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-39144 Detection Script Usage kali@kali:~$ python3 detection.py [*] Script Usage: python3 detection.py <target> [*] Example: python3 detection.py target.local kali@kali:~$ Detecting Vulnerable Targets kali@kali:~$ python3 detection.py vuln.target.local [+] The provided target seems to be vulnerable to CVE-2021-39144. Understanding the detection script The detection script works as follows: Scan the user-supplied arguments (to read the target). Send an HTTP PUT request to /api/2.0/services/usermgmt/password/1337 endpoint with the payload to trigger the payload (after deserialization of the supplied XML). Here's the XML payload sent to the target: <sorted-set> <string>foo</string> <dynamic-proxy> <interface>java.lang.Comparable</interface> <handler class="java.beans.EventHandler"> <target class="java.lang.ProcessBuilder"> <command> <string>bash</string> <string>-c</string> <string>sleep 5</string> </command> </target> <action>start</action> </handler> </dynamic-proxy> </sorted-set> The interesting part is: <command> <string>bash</string> <string>-c</string> <string>sleep 5</string> </command> The sleep 5 command is executed on the target if it is vulnerable. To detect vulnerable targets, if the response took more than 5 seconds, the target is reported to be potentially vulnerable. Otherwise, the target is reported to be potentially patched.
Affected OS & Apps
Webcenter Portal
by
Oracle
Commerce Guided Search
by
Oracle
Communications Cloud Native Core Binding Support Function
by
Oracle
Webcenter Portal
by
Oracle
Commerce Guided Search
by
Oracle
Communications Cloud Native Core Binding Support Function
by
Oracle
Communications Cloud Native Core Policy
by
Oracle
Communications Billing and Revenue Management Elastic Charging Engine
by
Oracle
Xstream
by
Xstream Project
Snapmanager
by
Netapp
Communications Cloud Native Core Automated Test Suite
by
Oracle
Communications Unified Inventory Management
by
Oracle
Retail Xstore Point of Service
by
Oracle
Utilities Framework
by
Oracle
Utilities Testing Accelerator
by
Oracle
Business Activity Monitoring
by
Oracle
Debian Linux
by
Debian
Fedora
by
Fedoraproject
Show more
4.7

Patch faster and smarter
with vRx

Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Trusted by 600+ customers:

Solution

Patch faster and better with vRx

Patch Management

vRx automatically deploys patches across all systems, cutting patching time by 80%.

Scripting Engine

vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.

Patchless Protection

vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.
Shortlist 2024 by Captera
4.9
Customer first by Gartner
4.7
Leader spring by G2
4.9

Hear from our Customers

Valuable resources saved

"Before vRx, we would spend countless hours manually finding and verifying patches. We saved so much time (and headache!)."
Anonymous IT Operations LeadAnonymous IT Operations Lead
Anonymous IT Operations Lead
IT Operations Lead

Third-party software patching is the most valuable feature.

"We have automated third-party patching on specific software, improving efficiency by 80%. vRx has reduced our patching time, which has improved our operations. It is more robust than other solutions because it offers better third-party remediation."
Billy TurnerBilly Turner
Billy Turner
VP, Managed Technology & Services

Single source of truth, capable of handling any application in our fleet

"vRx gives a single pane of glass to see what patches needed to go out and what sort of vulnerabilities we have on our Windows machines. Our meantime to remediate vulnerabilities has gone down by about 60% to 70%."
Peter FallowfieldPeter Fallowfield
Peter Fallowfield
IT Manager

60% faster remediation, many hours saved

"Typically, with our previous solution of ManageEngine, it took about three hours to patch Windows Server, and now, that is less than an hour. It means less downtime for the business each month when we do patches."
Anonymous Security AnalystAnonymous Security Analyst
Anonymous Security Analyst
Security Analyst

Great patching capabilities, helpful dashboard, and excellent support

"vRx has saved us an incredible amount of time. We can just rely on the automated system and the schedules we've set. It's a huge time saver. It's saved us hundreds of hours."
Michael CortezMichael Cortez
Michael Cortez
Sr. Director of IT

My favorite feature is Patchless Protection

"With Vicarius' vRx, I've never seen a patch that failed or had to be rolled back. We're saving quite a bit of time. Our clients using vRx haven't had any issues, and they've easily established patching for all their endpoints. "
Jeremy HermanJeremy Herman
Jeremy Herman
Security Engineer

Unified vulnerability discovery, prioritization, and remediation

"Vicarius streamlines vulnerability management between IT & Security by directly linking identified vulnerabilities to required patches, enhancing efficiency. The automation process has saved at least 30 percent of our manual tasks."
Wayne AjimineWayne Ajimine
Wayne Ajimine
Information Security Professional

Patchless Protection is an incredible technology!

"vRx reduces the time customers spend on patching by reducing the overhead on the administrators, allowing them to do additional work. It saves time they would spend addressing the patching process, follow-ups, etc."
Antwune GrayAntwune Gray
Antwune Gray
VP IT Security and Services

Merge Security & IT to Remediate Threats

“Vicarius’s vRx enabled Adama to centralize and consolidate work between IT and security teams, leading to a more efficient patching workflow."
Oshri CohenOshri Cohen
Oshri Cohen
CISO
4.7

Automated Patching, Scripting, and more

Talk with our team to get a personal walkthrough
Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.