Code Injection The advisory has been revoked - it doesn't affect any version of package org.apache.geronimo.gshell:gshell-embeddable  (opens in a new tab)


Threat Intelligence

Exploit Maturity
Mature
EPSS
24.68% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEGERONIMOGSHELL-30621
  • published15 May 2015
  • disclosed15 May 2015
  • creditUnknown

Introduced: 15 May 2015

CVE-2013-7285  (opens in a new tab)
CWE-94  (opens in a new tab)

Overview

org.apache.geronimo.gshell:gshell-embeddable Affected versions of the package are vulnerable to Arbitrary Code Injection. It was found that XStream could deserialize arbitrary user-supplied XML content, representing objects of any type. A remote attacker able to pass XML to XStream could use this flaw to perform a variety of attacks, including remote code execution in the context of the server running the XStream application.

References