#VU24686 Deserialization of Untrusted Data in XML-RPC - CVE-2019-17570
Published: January 28, 2020 / Updated: June 1, 2023
XML-RPC
Apache Foundation
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data within the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult() method in Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.