First published: Tue Oct 31 2017(Updated: )
The Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to execute arbitrary code via a crafted serialized Java object in an <ex:serializable> element. References: <a href="http://www.openwall.com/lists/oss-security/2016/07/12/5">http://www.openwall.com/lists/oss-security/2016/07/12/5</a> <a href="https://0ang3el.blogspot.in/2016/07/beware-of-ws-xmlrpc-library-in-your.html">https://0ang3el.blogspot.in/2016/07/beware-of-ws-xmlrpc-library-in-your.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
PHP XML-RPC | ||
Apache Archiva |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1508123 is critical due to the potential for remote code execution.
To fix REDHAT-BUG-1508123, update the Apache XML-RPC library to the latest version that addresses this vulnerability.
Users of Apache XML-RPC and Apache Archiva are potentially affected by REDHAT-BUG-1508123.
REDHAT-BUG-1508123 enables remote attackers to execute arbitrary code using crafted serialized Java objects.
The vulnerable component in REDHAT-BUG-1508123 is the Apache XML-RPC library version 3.1.3.