Apache XML-RPC vulnerable to Deserialization of Untrusted Data
Critical severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Jan 22, 2024
Description
Published by the National Vulnerability Database
Oct 27, 2017
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Feb 8, 2023
Last updated
Jan 22, 2024
The Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to execute arbitrary code via a crafted serialized Java object in an ex:serializable element.
References