Deserialization of Untrusted Data The advisory has been revoked - it doesn't affect any version of package org.apache.xmlrpc:xmlrpc Open this link in a new tab


    Threat Intelligence

    EPSS 41.97% (98th percentile)
Expand this section
NVD
9.8 critical
Expand this section
Red Hat
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGAPACHEXMLRPC-31033
  • published 13 Jul 2016
  • disclosed 13 Jul 2016
  • credit 0ang3el

Overview

By default ws-xmlrpc supports java.io.Serializable data types through <ex:serializable> element. An attacker can leverage this to call a method and pass a serialized Java object in that element. ws-xmlrpc will deserialize the malicious object without validation.