An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2078-1 | libxmlrpc3-java security update |
Debian DSA |
DSA-4619-1 | libxmlrpc3-java security update |
Github GHSA |
GHSA-6vwp-35w3-xph8 | Insecure Deserialization in Apache XML-RPC |
Ubuntu USN |
USN-4496-1 | Apache XML-RPC vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-05T01:40:15.866Z
Reserved: 2019-10-14T00:00:00
Link: CVE-2019-17570
No data.
Status : Modified
Published: 2020-01-23T22:15:10.200
Modified: 2024-11-21T04:32:33.230
Link: CVE-2019-17570
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN