Hide Forgot
A vulnerability was found in xstream API version 1.4.10, if the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM. References: https://access.redhat.com/security/cve/cve-2013-7285
External References: http://x-stream.github.io/changes.html#1.4.11
This issue has been addressed in the following products: Red Hat Process Automation Via RHSA-2019:1823 https://access.redhat.com/errata/RHSA-2019:1823
This issue has been addressed in the following products: Red Hat Decision Manager Via RHSA-2019:1822 https://access.redhat.com/errata/RHSA-2019:1822
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-10173
This issue has been addressed in the following products: Red Hat Fuse 7.5.0 Via RHSA-2019:3892 https://access.redhat.com/errata/RHSA-2019:3892
This issue has been addressed in the following products: Red Hat Fuse 6.3 Via RHSA-2019:4352 https://access.redhat.com/errata/RHSA-2019:4352
This issue has been addressed in the following products: Red Hat Single Sign-On Via RHSA-2020:0445 https://access.redhat.com/errata/RHSA-2020:0445
This issue has been addressed in the following products: Red Hat Data Grid 7.3.3 Via RHSA-2020:0727 https://access.redhat.com/errata/RHSA-2020:0727