Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
CPE | Name | Operator | Version |
---|---|---|---|
org.apache.dubbo:dubbo-rpc-http-invoker | eq | 2.7.4 | |
org.apache.dubbo:dubbo-rpc-http-invoker | eq | 2.7.4.1 |
advisory.checkmarx.net/advisory/CX-2020-4275
github.com/apache/dubbo/commit/9b18fe228971eaeca9b87d7b7e95df1c2a8ff91b
github.com/apache/dubbo/releases/tag/dubbo-2.7.5
lists.apache.org/thread.html/r13f7a58fa5d61d729e538a378687118e00c3e229903ba1e7b3a807a2%40%3Cdev.dubbo.apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2019-17564