logo

CVE-2021-43297 org.apache.dubbo:dubbo

Package

Manager: maven
Name: org.apache.dubbo:dubbo
Vulnerable Version: >=2.6.0 <2.6.12 || >=2.7.0 <2.7.15 || >=3.0.0 <3.0.5

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.4919 pctl0.9771

Details

Deserialization of Untrusted Data in Dubbo A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.

Metadata

Created: 2022-01-12T22:51:04Z
Modified: 2022-01-19T18:25:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-vp5x-3v8r-qprw/GHSA-vp5x-3v8r-qprw.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-vp5x-3v8r-qprw
Finding: F096
Auto approve: 1