Insecure Deserialization in Apache XML-RPC
Critical severity
GitHub Reviewed
Published
Jun 10, 2020
to the GitHub Advisory Database
•
Updated Jan 22, 2024
Description
Published by the National Vulnerability Database
Jan 23, 2020
Reviewed
Jun 9, 2020
Published to the GitHub Advisory Database
Jun 10, 2020
Last updated
Jan 22, 2024
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code.
Apache XML-RPC is no longer maintained and this issue will not be fixed.
References