CVE-2019-17570

CRITICAL

Apache Xml-rpc - Insecure Deserialization

Title source: rule

Description

An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.

Exploits (2)

nomisec WORKING POC 4 stars
by r00t4dm · poc
https://github.com/r00t4dm/CVE-2019-17570
nomisec WORKING POC
by slowmistio · poc
https://github.com/slowmistio/xmlrpc-common-deserialization

Scores

CVSS v3 9.8
EPSS 0.7052
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status published

Affected Products (13)

apache/xml-rpc
apache/xml-rpc
apache/xml-rpc
apache/xml-rpc
debian/debian_linux
debian/debian_linux
debian/debian_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
fedoraproject/fedora
fedoraproject/fedora
redhat/software_collections
org.apache.xmlrpc/xmlrpc Maven

Timeline

Published Jan 23, 2020
Tracked Since Feb 18, 2026