{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T11:31:55.387","vulnerabilities":[{"cve":{"id":"CVE-2023-45146","sourceIdentifier":"security-advisories@github.com","published":"2023-10-18T22:15:09.323","lastModified":"2024-11-21T08:26:26.510","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"XXL-RPC is a high performance, distributed RPC framework. With it, a TCP server can be set up using the Netty framework and the Hessian serialization mechanism. When such a configuration is used, attackers may be able to connect to the server and provide malicious serialized objects that, once deserialized, force it to execute arbitrary code. This can be abused to take control of the machine the server is running by way of remote code execution. This issue has not been fixed."},{"lang":"es","value":"XXL-RPC es un framework RPC distribuido de alto rendimiento. Con él, se puede configurar un servidor TCP utilizando el marco Netty y el mecanismo de serialización de Hesse. Cuando se utiliza dicha configuración, los atacantes pueden conectarse al servidor y proporcionar objetos serializados maliciosos que, una vez deseriaizados, lo obligan a ejecutar código arbitrario. Se puede abusar de esto para tomar el control de la máquina que ejecuta el servidor mediante la ejecución remota de código. Este problema no se ha solucionado."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xxl-rpc_project:xxl-rpc:*:*:*:*:*:*:*:*","versionEndIncluding":"1.7.0","matchCriteriaId":"E9AF588F-3BB3-421A-9FEB-A1EACED79D2A"}]}]}],"references":[{"url":"https:\/\/securitylab.github.com\/advisories\/GHSL-2023-052_XXL-RPC\/","source":"security-advisories@github.com","tags":["Product","Third Party Advisory"]},{"url":"https:\/\/securitylab.github.com\/advisories\/GHSL-2023-052_XXL-RPC\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product","Third Party Advisory"]},{"url":"https:\/\/www.vicarius.io\/vsociety\/posts\/xxl-rpc-rce-cve-2023-45146","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}