First published: Thu Nov 21 2019(Updated: )
Guillaume Teissier reported a flaw in Apache XMLRPC: Java untrusted deserialization in faultCause when processing an XMLRPC response. XMLRPC clients are thus targeted by this vulnerability, and rogue XMLRPC servers may gain arbitrary code execution on the XMLRPC client. The vulnerability lays in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult(Object) method. This vulnerability is different from <a href="https://access.redhat.com/security/cve/CVE-2016-5003">CVE-2016-5003</a>, which uses ex:serializable type to perform deserialization. This new vulnerability only affects XMLRPC clients, which will receive response, possible faults. It is exploitable in default configuration.
Affected Software | Affected Version | How to fix |
---|---|---|
PHP XML-RPC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1775193 is critical due to the potential for arbitrary code execution.
To fix REDHAT-BUG-1775193, update to the latest patched version of Apache XML-RPC that addresses this vulnerability.
Apache XML-RPC is the software affected by REDHAT-BUG-1775193.
REDHAT-BUG-1775193 is an untrusted deserialization vulnerability in Apache XML-RPC.
The vulnerability REDHAT-BUG-1775193 was reported by Guillaume Teissier.