Description
The Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to execute arbitrary code via a crafted serialized Java object in an
Remediation
References
http://www.openwall.com/lists/oss-security/2016/07/12/5
http://www.openwall.com/lists/oss-security/2020/01/16/1
http://www.openwall.com/lists/oss-security/2020/01/24/2
http://www.securityfocus.com/bid/91736
http://www.securityfocus.com/bid/91738
http://www.securitytracker.com/id/1036294
https://0ang3el.blogspot.ru/2016/07/beware-of-ws-xmlrpc-library-in-your.html
https://access.redhat.com/errata/RHSA-2018:1779
https://access.redhat.com/errata/RHSA-2018:1780
https://access.redhat.com/errata/RHSA-2018:1784
https://access.redhat.com/errata/RHSA-2018:2317
https://access.redhat.com/errata/RHSA-2018:3768
https://exchange.xforce.ibmcloud.com/vulnerabilities/115043
https://security.gentoo.org/glsa/202401-26
Related Vulnerabilities
CVE-2018-1000614 Vulnerability in maven package org.onosproject:onos-netconf-provider-alarm
CVE-2015-3250 Vulnerability in maven package org.apache.directory.api:apache-ldap-api
CVE-2019-10334 Vulnerability in maven package org.jenkins-ci.plugins:electricflow
CVE-2020-28196 Vulnerability in npm package node-krb5
CVE-2023-39913 Vulnerability in maven package org.apache.uima:uimaj-core