Description
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
Exploits (3)
References (11)
Core 11
Core References
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2020/01/24/2
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2020/01/msg00033.html
Third Party Advisory vendor-advisory
https://access.redhat.com/errata/RHSA-2020:0310
Third Party Advisory vendor-advisory
https://www.debian.org/security/2020/dsa-4619
Mailing List, Third Party Advisory mailing-list
https://seclists.org/bugtraq/2020/Feb/8
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I3QCRLJYQRGVTIYF4BXYRFSF3ONP3TBF/
Patch, Third Party Advisory vendor-advisory
https://usn.ubuntu.com/4496-1/
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202401-26
Exploit, Third Party Advisory
https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp
Scores
CVSS v3
9.8
EPSS
0.7052
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-502
Status
published
Products (13)
apache/xml-rpc
3.1
apache/xml-rpc
3.1.1
apache/xml-rpc
3.1.2
apache/xml-rpc
3.1.3
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
debian/debian_linux
8.0
debian/debian_linux
9.0
debian/debian_linux
10.0
fedoraproject/fedora
31
... and 3 more
Published
Jan 23, 2020
Tracked Since
Feb 18, 2026