CVE-2021-25640 – org.apache.dubbo:dubbo
Package
Manager: maven
Name: org.apache.dubbo:dubbo
Vulnerable Version: >=2.5.0 <2.7.10
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00398 pctl0.5982
Details
Server-Side Request Forgery in Apache Dubbo In Apache Dubbo prior to 2.6.9 and 2.7.10, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability.
Metadata
Created: 2022-03-18T17:56:45Z
Modified: 2022-03-18T17:56:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-gw4j-4229-q4px/GHSA-gw4j-4229-q4px.json
CWE IDs: ["CWE-601", "CWE-918"]
Alternative ID: GHSA-gw4j-4229-q4px
Finding: F100
Auto approve: 1