An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2078-1 libxmlrpc3-java security update
Debian DSA Debian DSA DSA-4619-1 libxmlrpc3-java security update
Github GHSA Github GHSA GHSA-6vwp-35w3-xph8 Insecure Deserialization in Apache XML-RPC
Ubuntu USN Ubuntu USN USN-4496-1 Apache XML-RPC vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-05T01:40:15.866Z

Reserved: 2019-10-14T00:00:00

Link: CVE-2019-17570

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-23T22:15:10.200

Modified: 2024-11-21T04:32:33.230

Link: CVE-2019-17570

cve-icon Redhat

Severity : Important

Publid Date: 2020-01-16T00:00:00Z

Links: CVE-2019-17570 - Bugzilla

cve-icon OpenCVE Enrichment

No data.