Description
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2078-1 | libxmlrpc3-java security update |
Debian DSA |
DSA-4619-1 | libxmlrpc3-java security update |
Github GHSA |
GHSA-6vwp-35w3-xph8 | Insecure Deserialization in Apache XML-RPC |
Ubuntu USN |
USN-4496-1 | Apache XML-RPC vulnerability |
References
History
No history.
Subscriptions
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-05T01:40:15.866Z
Reserved: 2019-10-14T00:00:00.000Z
Link: CVE-2019-17570
No data.
Status : Modified
Published: 2020-01-23T22:15:10.200
Modified: 2024-11-21T04:32:33.230
Link: CVE-2019-17570
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN