It is, therefore, affected by a vulnerability as referenced in the ALAS2-2023-2080 advisory.
– An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed. (CVE-2019-17570)
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.Read More