CVE-2019-17570
CRITICALApache Xml-rpc - Insecure Deserialization
Title source: ruleDescription
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
Exploits (2)
References (11)
Scores
CVSS v3
9.8
EPSS
0.7052
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (13)
apache/xml-rpc
apache/xml-rpc
apache/xml-rpc
apache/xml-rpc
debian/debian_linux
debian/debian_linux
debian/debian_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
fedoraproject/fedora
fedoraproject/fedora
redhat/software_collections
org.apache.xmlrpc/xmlrpc
Maven
Timeline
Published
Jan 23, 2020
Tracked Since
Feb 18, 2026