{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-17570","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","dateUpdated":"2024-08-05T01:40:15.866Z","dateReserved":"2019-10-14T00:00:00.000Z","datePublished":"2020-01-23T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2024-01-22T16:06:22.643Z"},"descriptions":[{"lang":"en","value":"An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed."}],"affected":[{"vendor":"Apache","product":"Apache XML-RPC","versions":[{"version":"Apache XML-RPC all versions","status":"affected"}]}],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-17570%3B"},{"url":"https://lists.apache.org/thread.html/846551673bbb7ec8d691008215384bcef03a3fb004d2da845cfe88ee%401390230951%40%3Cdev.ws.apache.org%3E"},{"name":"[oss-security] 20200124 RE: [CVE-2019-17570] xmlrpc-common untrusted deserialization","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2020/01/24/2"},{"name":"[debian-lts-announce] 20200130 [SECURITY] [DLA 2078-1] libxmlrpc3-java security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00033.html"},{"name":"RHSA-2020:0310","tags":["vendor-advisory"],"url":"https://access.redhat.com/errata/RHSA-2020:0310"},{"name":"DSA-4619","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2020/dsa-4619"},{"name":"20200210 [SECURITY] [DSA 4619-1] libxmlrpc3-java security update","tags":["mailing-list"],"url":"https://seclists.org/bugtraq/2020/Feb/8"},{"name":"FEDORA-2020-1d0635bd71","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I3QCRLJYQRGVTIYF4BXYRFSF3ONP3TBF/"},{"name":"USN-4496-1","tags":["vendor-advisory"],"url":"https://usn.ubuntu.com/4496-1/"},{"url":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp"},{"name":"GLSA-202401-26","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202401-26"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Deserialization"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T01:40:15.866Z"},"title":"CVE Program Container","references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-17570%3B","tags":["x_transferred"]},{"url":"https://lists.apache.org/thread.html/846551673bbb7ec8d691008215384bcef03a3fb004d2da845cfe88ee%401390230951%40%3Cdev.ws.apache.org%3E","tags":["x_transferred"]},{"name":"[oss-security] 20200124 RE: [CVE-2019-17570] xmlrpc-common untrusted deserialization","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2020/01/24/2"},{"name":"[debian-lts-announce] 20200130 [SECURITY] [DLA 2078-1] libxmlrpc3-java security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00033.html"},{"name":"RHSA-2020:0310","tags":["vendor-advisory","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2020:0310"},{"name":"DSA-4619","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2020/dsa-4619"},{"name":"20200210 [SECURITY] [DSA 4619-1] libxmlrpc3-java security update","tags":["mailing-list","x_transferred"],"url":"https://seclists.org/bugtraq/2020/Feb/8"},{"name":"FEDORA-2020-1d0635bd71","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I3QCRLJYQRGVTIYF4BXYRFSF3ONP3TBF/"},{"name":"USN-4496-1","tags":["vendor-advisory","x_transferred"],"url":"https://usn.ubuntu.com/4496-1/"},{"url":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp","tags":["x_transferred"]},{"name":"GLSA-202401-26","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202401-26"}]}]}}