Description
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
Published: 2020-01-23
Score: 9.8 Critical
EPSS: 70.5% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2078-1 libxmlrpc3-java security update
Debian DSA Debian DSA DSA-4619-1 libxmlrpc3-java security update
Github GHSA Github GHSA GHSA-6vwp-35w3-xph8 Insecure Deserialization in Apache XML-RPC
Ubuntu USN Ubuntu USN USN-4496-1 Apache XML-RPC vulnerability
History

No history.

Subscriptions

Apache Xml-rpc
Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Redhat Enterprise Linux Jboss Fuse Rhel Software Collections Software Collections
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-05T01:40:15.866Z

Reserved: 2019-10-14T00:00:00.000Z

Link: CVE-2019-17570

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-23T22:15:10.200

Modified: 2024-11-21T04:32:33.230

Link: CVE-2019-17570

cve-icon Redhat

Severity : Important

Publid Date: 2020-01-16T00:00:00Z

Links: CVE-2019-17570 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses