Hi Jorg,
I've send in a PR for a new permission type (that isn't actived by
default yet),
would you mind reviewing it?
https://github.com/x-stream/xstream/pull/99
"
This permission accepts any class with an XStream annotations, because
that class was designed with XStream in mind and therefore it is fair to
presume it is not vulnerable.
Jackson and JAXB follow this philosophy too and they don't have any
CVE's against this behavior.
This PR just creates and tests that class, but I strongly believe it
should also be added into XStream.setupDefaultSecurity(), so XStream 1.5
isn't harder to use than JAXB and Jackson. However, that's a different
issue/discussion, so I haven't included that change here, due to the
debatable nature of that change.
(The fact that XStream can also be used without annotations is unrelated
to this change, because just because the security framework has to be a
pain for xstream usage without annotations, it shouldn't force xstream
usage with annotations be as painful if that approach does have a less
painful solution.)