mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 18:20:53 +00:00
29 lines
1.4 KiB
Markdown
29 lines
1.4 KiB
Markdown
![]() |
### [CVE-2019-17570](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17570)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://www.openwall.com/lists/oss-security/2020/01/24/2
|
||
|
- https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Live-Hack-CVE/CVE-2019-17570
|
||
|
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/fbeasts/xmlrpc-common-deserialization
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/omegat-org/apache-xmlrpc
|
||
|
- https://github.com/omegat-org/moses-plugin
|
||
|
- https://github.com/r00t4dm/CVE-2019-17570
|
||
|
- https://github.com/slowmistio/xmlrpc-common-deserialization
|
||
|
|