Mageia 2019-0002: xmlrpc security update
Summary
XML external entity (XXE) vulnerability in the Apache XML-RPC
(aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote
attackers to conduct server-side request forgery (SSRF) attacks via a
crafted DTD (CVE-2016-5002).
A flaw was discovered in the Apache XML-RPC (ws-xmlrpc) library that
deserializes untrusted data when enabledForExtensions setting is
enabled. A remote attacker could use this vulnerability to execute
arbitrary code via a crafted serialized Java object in a
References
- https://bugs.mageia.org/show_bug.cgi?id=23105
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/5AEMJ2ZNFZVGVMACAZMQQCBOFBVUTNZA/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5002
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5003
Resolution
MGASA-2019-0002 - Updated xmlrpc packages fix security vulnerabilities
SRPMS
- 6/core/xmlrpc-3.1.3-70.1.mga6