![Dinis Cruz Blog: XStream "Remote Code Execution" exploit on code from "Standard way to serialize and deserialize Objects with XStream" article Dinis Cruz Blog: XStream "Remote Code Execution" exploit on code from "Standard way to serialize and deserialize Objects with XStream" article](https://1.bp.blogspot.com/--XV55ajaav8/UrY53k9vgrI/AAAAAAAAFQo/U6SJIptLR1c/s1600/Screen+Shot+2013-12-22+at+00.59.42.png)
Dinis Cruz Blog: XStream "Remote Code Execution" exploit on code from "Standard way to serialize and deserialize Objects with XStream" article
![Jas502n on Twitter: "#CVE-2020-26217: XStream(version 1.4.13) can be used for Remote Code Execution. Poc: https://t.co/UEsn1K0WTC https://t.co/W1CrPyvUcr" / Twitter Jas502n on Twitter: "#CVE-2020-26217: XStream(version 1.4.13) can be used for Remote Code Execution. Poc: https://t.co/UEsn1K0WTC https://t.co/W1CrPyvUcr" / Twitter](https://pbs.twimg.com/media/EpIrfVhUYAIhJi9.jpg)
Jas502n on Twitter: "#CVE-2020-26217: XStream(version 1.4.13) can be used for Remote Code Execution. Poc: https://t.co/UEsn1K0WTC https://t.co/W1CrPyvUcr" / Twitter
![I found a new chain and used Java runtime to bypass the blacklist, and want to report this issue to XStream. How can i report this issue's detail? I found a new chain and used Java runtime to bypass the blacklist, and want to report this issue to XStream. How can i report this issue's detail?](https://groups.google.com/group/xstream-user/attach/7422c780b6f6f/1622427215988_DA3D036D-D89E-4F72-9041-8E2D610ECD4E.png?part=0.1)
I found a new chain and used Java runtime to bypass the blacklist, and want to report this issue to XStream. How can i report this issue's detail?
A Server-Side Forgery Request can be activated unmarshalling with XStream · Advisory · x-stream/xstream · GitHub
![How to pass object as string when delivering message to process - Camunda Platform 7 Process Engine - Camunda Platform Forum How to pass object as string when delivering message to process - Camunda Platform 7 Process Engine - Camunda Platform Forum](https://forum.camunda.io/uploads/default/original/3X/4/f/4f75e7d6787c5a4ccd6af8925e9920d0ab4d0d15.png)