First published: Tue May 24 2016(Updated: )
A flaw was discovered in the Apache XML-RPC (ws-xmlrpc) library that deserializes untrusted data when enabledForExtensions setting is enabled. A remote attacker could use this vulnerability to execute arbitrary code via a crafted serialized Java object in a <ex:serializable> element.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xmlrpc3 | <0:3.0-4.17.el6_9 | 0:3.0-4.17.el6_9 |
redhat/xmlrpc | <1:3.1.3-9.el7_5 | 1:3.1.3-9.el7_5 |
redhat/rh-java-common-xmlrpc | <1:3.1.3-8.16.el6 | 1:3.1.3-8.16.el6 |
redhat/rh-java-common-xmlrpc | <1:3.1.3-8.16.el7 | 1:3.1.3-8.16.el7 |
Apache Ws-xmlrpc | =3.1.3 | |
maven/org.apache.xmlrpc:xmlrpc | <=3.1.3 | |
=3.1.3 |
Setting enabledForExtensions is false by default, thus <ex:serializable> elements are not automatically deserialized. However, if you have it enabled and you don't need any of the provided functions (https://ws.apache.org/xmlrpc/extensions.html) we suggest you disable it.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)