Server-side Request Forgery (SSRF) Affecting org.apache.xmlrpc:xmlrpc package, versions [3.0,3.1.4)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
7.83% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEXMLRPC-31032
  • published13 Jul 2016
  • disclosed13 Jul 2016
  • credit0ang3el

Introduced: 13 Jul 2016

CVE-2016-5002  (opens in a new tab)
CWE-918  (opens in a new tab)

Overview

org.apache.xmlrpc:xmlrpc is a Java implementation of XML-RPC, a popular protocol that uses XML over HTTP to implement remote procedure calls.

Affected versions of the package are vulnerable to Server Side Request Forgery (SSRF). Sending an XML with a DOCTYPE declaration that loads an external DTD, a malicious user can send a GET request to the host on behalf of a vulnerable xml-rpc endpoint.

CVSS Base Scores

version 3.1