Deserialization of Untrusted Data The advisory has been revoked - it doesn't affect any version of package org.apache.xmlrpc:xmlrpc Open this link in a new tab
Threat Intelligence
EPSS
41.97% (98th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHEXMLRPC-31033
- published 13 Jul 2016
- disclosed 13 Jul 2016
- credit 0ang3el
Introduced: 13 Jul 2016
CVE-2016-5003 Open this link in a new tabOverview
By default ws-xmlrpc
supports java.io.Serializable
data types through <ex:serializable>
element. An attacker can leverage this to call a method and pass a serialized Java object in that element. ws-xmlrpc
will deserialize the malicious object without validation.