Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-21349

CVE-2021-21349: NetApp OnCommand Insight SSRF Vulnerability

CVE-2021-21349 is a server-side request forgery vulnerability in NetApp OnCommand Insight affecting XStream versions before 1.4.16. Attackers can access internal resources through manipulated input streams. This article covers technical details, affected versions, impact assessment, and mitigation strategies.

Published: February 25, 2026

CVE-2021-21349 Overview

CVE-2021-21349 is a Server-Side Request Forgery (SSRF) vulnerability affecting XStream, a widely-used Java library for serializing objects to XML and back. This vulnerability allows remote attackers to manipulate the processed input stream to request data from internal resources that are not publicly accessible. The flaw exists in XStream versions prior to 1.4.16 and impacts organizations relying on XStream's default blacklist security configuration rather than implementing a whitelist-based approach.

The vulnerability arises from insufficient input validation during deserialization, enabling attackers to craft malicious XML payloads that trigger requests to internal network resources. This can lead to unauthorized access to sensitive internal services, metadata endpoints, and other backend systems that should not be externally reachable.

Critical Impact

Remote attackers can access internal resources and sensitive data from non-public network services by exploiting the SSRF vulnerability in XStream's deserialization process.

Affected Products

  • XStream versions prior to 1.4.16
  • Apache ActiveMQ (versions 5.16.0, 5.16.1 and earlier)
  • Apache JMeter (affected versions)
  • NetApp OnCommand Insight
  • Oracle Java SE (7u321, 8u311)
  • Oracle GraalVM Enterprise (20.3.4, 21.3.0)
  • Oracle Banking Platform (2.4.0, 2.7.1, 2.9.0, 2.12.0)
  • Oracle Communications Unified Inventory Management (7.3.2 - 7.4.1)
  • Oracle WebCenter Portal (11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0)
  • Debian Linux (9.0, 10.0, 11.0)
  • Fedora (33, 34, 35)

Discovery Timeline

  • 2021-03-23 - CVE-2021-21349 published to NVD
  • 2025-05-23 - Last updated in NVD database

Technical Details for CVE-2021-21349

Vulnerability Analysis

This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data) and CWE-918 (Server-Side Request Forgery). The flaw exploits XStream's deserialization mechanism, which can be abused when processing untrusted XML input. The attack is network-accessible, requires no authentication or user interaction, and can impact resources beyond the vulnerable component's security scope.

The vulnerability specifically allows attackers to bypass XStream's default blacklist-based security controls. While XStream provides a security framework, organizations using the default configuration rather than implementing strict type whitelisting remain vulnerable to this attack vector.

Root Cause

The root cause lies in XStream's approach to security through blacklisting rather than whitelisting. The library's default security framework uses a blacklist to prevent deserialization of known dangerous classes. However, attackers discovered new gadget chains that bypass these blacklists, allowing them to construct XML payloads that trigger SSRF attacks during deserialization.

When XStream processes a maliciously crafted XML document, it can instantiate objects that make network requests to arbitrary URLs, including internal network addresses. This occurs because the deserialization process does not adequately validate or restrict the types of objects being reconstructed and their associated behaviors.

Attack Vector

The attack is executed remotely over the network by submitting specially crafted XML data to an application that uses XStream for deserialization. The attacker does not need any authentication or privileges, and no user interaction is required for exploitation.

An attacker constructs an XML payload containing serialized object references that, when deserialized by XStream, trigger HTTP requests to internal resources. These requests can target cloud metadata services (such as http://169.254.169.254/), internal APIs, database servers, or other sensitive backend services.

The attack flow involves:

  1. Identifying an application endpoint that accepts and deserializes XML using XStream
  2. Crafting an XML payload with serialized objects designed to trigger outbound requests
  3. Submitting the payload to the vulnerable endpoint
  4. XStream deserializes the payload, causing the server to make requests to attacker-specified internal URLs
  5. Response data from internal services may be exfiltrated or used for further attacks

For detailed technical information about the exploitation technique, refer to the GitHub Security Advisory and the X-Stream CVE-2021-21349 Details.

Detection Methods for CVE-2021-21349

Indicators of Compromise

  • Unusual outbound HTTP/HTTPS connections from application servers to internal IP ranges (e.g., 10.x.x.x, 172.16.x.x, 192.168.x.x)
  • Requests to cloud metadata endpoints (169.254.169.254) from unexpected services
  • Anomalous XML payloads in application logs containing suspicious class references
  • Unexpected network traffic to internal services from Java-based applications using XStream

Detection Strategies

  • Monitor application endpoints that accept XML input for suspicious serialization patterns
  • Implement network monitoring to detect SSRF attempts targeting internal resources
  • Deploy web application firewalls (WAF) with rules to detect XStream exploitation attempts
  • Analyze Java application logs for deserialization exceptions or warnings related to blocked types

Monitoring Recommendations

  • Enable verbose logging for XStream security framework events
  • Configure network intrusion detection systems to alert on internal network scanning from application servers
  • Monitor DNS queries for internal hostname resolution from externally-facing applications
  • Implement egress filtering and log all outbound connections from vulnerable application tiers

How to Mitigate CVE-2021-21349

Immediate Actions Required

  • Upgrade XStream to version 1.4.16 or later immediately
  • Implement XStream's security framework with a strict whitelist of allowed types
  • Audit all applications using XStream to identify vulnerable deployments
  • Review and restrict network egress from application servers to minimize SSRF impact

Patch Information

The vulnerability is resolved in XStream version 1.4.16 and later. Organizations should update to the latest available version of XStream. For detailed release notes, see the X-Stream Release Changes.

Multiple vendors have released patches addressing this vulnerability:

  • Oracle addressed this issue in the January 2022 CPU Advisory, October 2021 CPU Advisory, and July 2021 CPU Advisory
  • Debian released security updates via DSA-5004 and the LTS Security Announcement
  • NetApp published guidance in their Security Advisory
  • Fedora released updated packages for Fedora 33, 34, and 35

Workarounds

  • Configure XStream's security framework with a whitelist limited to the minimal required types for your application
  • Block deserialization of unnecessary or dangerous classes using XStream's allowTypeHierarchy() and denyTypes() methods
  • Implement network segmentation to limit the impact of SSRF attacks on internal resources
  • Deploy input validation at the application layer to reject malformed or suspicious XML payloads
bash
# Example XStream security configuration (Java)
# Configure whitelist-based security framework
XStream xstream = new XStream();
xstream.addPermission(NoTypePermission.NONE);
xstream.addPermission(NullPermission.NULL);
xstream.addPermission(PrimitiveTypePermission.PRIMITIVES);
xstream.allowTypeHierarchy(Collection.class);
xstream.allowTypes(new Class[] { YourAllowedClass.class });

For comprehensive workaround guidance, refer to the X-Stream Security Workarounds documentation.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSSRF

  • Vendor/TechNetapp Oncommand Insight

  • SeverityHIGH

  • CVSS Score8.6

  • EPSS Probability5.91%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-502

  • CWE-918
  • Technical References
  • X-Stream Release Changes

  • GitHub Security Advisory

  • Apache ActiveMQ User Thread

  • Apache JMeter Dev Thread

  • Debian LTS Security Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • NetApp Security Advisory

  • Debian Security Advisory

  • Oracle July 2021 CPU Advisory

  • Oracle October 2021 CPU Advisory

  • X-Stream CVE-2021-21349 Details
  • Vendor Resources
  • Oracle January 2022 CPU Advisory

  • X-Stream Security Workarounds
  • Related CVEs
  • CVE-2021-21342: XStream SSRF Vulnerability in Java Library

  • CVE-2021-21350: NetApp OnCommand Insight RCE Vulnerability

  • CVE-2021-21348: NetApp OnCommand Insight DoS Vulnerability

  • CVE-2021-21346: NetApp OnCommand Insight RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English