{"vulnerability": "CVE-2021-43859", "sightings": [{"uuid": "33c8d64b-d722-4b2e-bee8-dc1128a85a3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43859", "type": "seen", "source": "https://t.me/arpsyndicate/3229", "content": "#ExploitObserverAlert\n\nCVE-2021-43859\n\nDESCRIPTION: Exploit Observer has 11 entries in 5 file formats related to CVE-2021-43859. XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.\n\nFIRST-EPSS: 0.012320000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-28T06:16:41.000000Z"}, {"uuid": "1289f181-30e9-448d-8c4c-292e90774b54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43859", "type": "seen", "source": "https://t.me/cibsecurity/37055", "content": "\u203c CVE-2022-0538 \u203c\n\nJenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-09T16:12:50.000000Z"}]}