CVE-2019-17570

CRITICAL

Apache Xml-rpc - Insecure Deserialization

Title source: rule
STIX 2.1

Description

An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.

Exploits (3)

nomisec WORKING POC 4 stars
by r00t4dm · poc
https://github.com/r00t4dm/CVE-2019-17570
nomisec WORKING POC
by im23pds · poc
https://github.com/im23pds/xmlrpc-common-deserialization
nomisec WORKING POC
by slowmistio · poc
https://github.com/slowmistio/xmlrpc-common-deserialization

Scores

CVSS v3 9.8
EPSS 0.7052
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-502
Status published
Products (13)
apache/xml-rpc 3.1
apache/xml-rpc 3.1.1
apache/xml-rpc 3.1.2
apache/xml-rpc 3.1.3
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
debian/debian_linux 8.0
debian/debian_linux 9.0
debian/debian_linux 10.0
fedoraproject/fedora 31
... and 3 more
Published Jan 23, 2020
Tracked Since Feb 18, 2026