First published: Thu Nov 21 2019(Updated: )
A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-java-common-xmlrpc | <1:3.1.3-8.17.el6 | 1:3.1.3-8.17.el6 |
redhat/rh-java-common-xmlrpc | <1:3.1.3-8.17.el7 | 1:3.1.3-8.17.el7 |
debian/libxmlrpc3-java | <=3.1.3-9<=3.1.3-8 | 3.1.3-9+deb10u1 3.1.3-8+deb9u1 |
Apache XML-RPC | =3.1 | |
Apache XML-RPC | =3.1.1 | |
Apache XML-RPC | =3.1.2 | |
Apache XML-RPC | =3.1.3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Redhat Software Collections | =1.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
Redhat Enterprise Linux | =7.7 | |
All of | ||
Redhat Software Collections | =1.0 | |
Any of | ||
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
Redhat Enterprise Linux | =7.7 | |
maven/org.apache.xmlrpc:xmlrpc | <=3.1.3 | |
ubuntu/libxmlrpc3-java | <3.1.3-9+ | 3.1.3-9+ |
ubuntu/libxmlrpc3-java | <3.1.3-7+ | 3.1.3-7+ |
debian/libxmlrpc3-java |
There is no known mitigation other than restricting applications using the Apache XMLRPC client library from sending requests to untrusted XMLRPC servers.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17570 is a vulnerability that allows for untrusted deserialization in the Apache XMLRPC client implementation.
CVE-2019-17570 affects Apache XMLRPC by allowing a malicious XMLRPC server to execute arbitrary code.
CVE-2019-17570 is rated as critical with a severity value of 9.8.
CVE-2019-17570 affects versions 3.1 to 3.1.3 of Apache XML-RPC and versions 3.1.3-8+deb9u1 to 3.1.3-9+deb10u1 of libxmlrpc3-java.
To fix the CVE-2019-17570 vulnerability, update to version 3.1.3-8.17.el6 or later for rh-java-common-xmlrpc on Red Hat systems, or version 3.1.3-9+deb10u1 or later for libxmlrpc3-java on Debian systems.