Skip to content

Unsafe Deserialization of User Data Using XStream

High
gnaegi published GHSA-596v-3gwh-2m9w Aug 31, 2021

Package

No package listed

Affected versions

<15.5.3

Patched versions

15.3.18, 15.5.3

Description

Impact

Using a prepared import XML file (e.g. a course) any class on the Java classpath can be instantiated, including spring AOP bean factories. This can be used to execute code arbitrary code by the attacker.

The attack requires an OpenOlat user account with the authoring role. It can not be exploited by unregistered users.

Patches

The problem is fixed in version 15.3.18, 15.5.3 and 16.0. It is advised to upgrade to version 16.0.x

Workarounds

There are no known workarounds to fix this problem, an upgrade is necessary.

References

https://jira.openolat.org/browse/OO-5548 (only visible to members of the OpenOlat partner program)

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2021-39181

Weaknesses

No CWEs

Credits