Upgrade com.thoughtworks.xstream:xstream to version 1.4.11
It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285)
This commit is contained in:
2
pom.xml
2
pom.xml
@@ -173,7 +173,7 @@
|
|||||||
<dependency>
|
<dependency>
|
||||||
<groupId>com.thoughtworks.xstream</groupId>
|
<groupId>com.thoughtworks.xstream</groupId>
|
||||||
<artifactId>xstream</artifactId>
|
<artifactId>xstream</artifactId>
|
||||||
<version>1.4.10</version>
|
<version>1.4.11</version>
|
||||||
</dependency>
|
</dependency>
|
||||||
<!-- 由于guava较新的21.0版本需要jdk8,故而此处采用较低版本 -->
|
<!-- 由于guava较新的21.0版本需要jdk8,故而此处采用较低版本 -->
|
||||||
<dependency>
|
<dependency>
|
||||||
|
|||||||
Reference in New Issue
Block a user