Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-17570

Опубликовано: 16 янв. 2020
Источник: redhat
CVSS3: 9.8
EPSS Высокий

Описание

An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.

A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.

Отчет

Red Hat Enterprise Linux 7 provides vulnerable version of xmlrpc via the Optional repository. As the Optional repository is not supported, this issue is not planned to be addressed there. Red Hat Virtualization Manager uses xmlrpc only for internal communication with the scheduler. Since this is a component of the Manager itself, it is not subject to attacker influence and does not represent an attack surface.

Меры по смягчению последствий

There is no known mitigation other than restricting applications using the Apache XMLRPC client library from sending requests to untrusted XMLRPC servers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xmlrpcNot affected
Red Hat Enterprise Linux 6xmlrpc3Not affected
Red Hat Enterprise Linux 7xmlrpcWill not fix
Red Hat Fuse 7camel-xmlrpcNot affected
Red Hat JBoss Fuse 6camel-xmlrpcAffected
Red Hat Storage 3xmprpc-commonOut of support scope
Red Hat Virtualization 4xmlrpc-commonWill not fix
Red Hat Fuse 7.6.0camel-xmlrpcFixedRHSA-2020:098326.03.2020
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-java-common-xmlrpcFixedRHSA-2020:031030.01.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-java-common-xmlrpcFixedRHSA-2020:031030.01.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1775193xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response

EPSS

Процентиль: 99%
0.70524
Высокий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.

CVSS3: 9.8
nvd
около 6 лет назад

An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.

CVSS3: 9.8
debian
около 6 лет назад

An untrusted deserialization was found in the org.apache.xmlrpc.parser ...

CVSS3: 9.8
github
больше 5 лет назад

Insecure Deserialization in Apache XML-RPC

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость метода org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult библиотеки Apache XML-RPC, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 99%
0.70524
Высокий

9.8 Critical

CVSS3