Lucene search

K

10 matches found

CVE
CVE
added 2021/06/01 2:15 p.m.106 views

CVE-2021-25641

Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the...

9.8CVSS9.5AI score0.74804EPSS
CVE
CVE
added 2021/06/01 2:15 p.m.99 views

CVE-2021-30179

Apache Dubbo prior to 2.6.9 and 2.7.9 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API t...

9.8CVSS9.5AI score0.03582EPSS
CVE
CVE
added 2021/09/07 10:15 a.m.88 views

CVE-2021-36163

In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applyin...

9.8CVSS9.3AI score0.01284EPSS
CVE
CVE
added 2021/06/01 2:15 p.m.70 views

CVE-2021-30180

Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constru...

9.8CVSS9.5AI score0.03155EPSS
CVE
CVE
added 2021/09/07 10:15 a.m.70 views

CVE-2021-36162

Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing...

8.8CVSS8.7AI score0.00995EPSS
CVE
CVE
added 2021/06/01 2:15 p.m.68 views

CVE-2021-30181

Apache Dubbo prior to 2.6.9 and 2.7.9 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run th...

9.8CVSS9.5AI score0.03311EPSS
CVE
CVE
added 2021/09/09 8:15 a.m.68 views

CVE-2021-37579

The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native jav...

9.8CVSS9.5AI score0.04556EPSS
CVE
CVE
added 2021/06/01 2:15 p.m.65 views

CVE-2021-25640

In Apache Dubbo prior to 2.6.9 and 2.7.9, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability.

6.1CVSS6.1AI score0.00398EPSS
CVE
CVE
added 2021/09/09 8:15 a.m.65 views

CVE-2021-36161

Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13

9.8CVSS9.5AI score0.03155EPSS
CVE
CVE
added 2021/01/11 10:15 a.m.58 views

CVE-2020-11995

A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored i...

9.8CVSS9.7AI score0.01417EPSS