Summary: | dev-java/xmlrpc: Multiple vulnerabilities (CVE-2016-{5002,5003}. CVE-2019-17570) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | IN_PROGRESS --- | ||
Severity: | normal | CC: | ajak, java |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [upstream/ebuild cve] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
![]() ![]() ![]() CVE-2019-17570: An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed. Patch from Bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1775193): https://bugzilla.redhat.com/attachment.cgi?id=1644752&action=diff This seems to indicate xmlrpc is no longer maintained: https://www.openwall.com/lists/oss-security/2020/01/24/2 |