Apache

Dubbo

19 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.49%
  • Veröffentlicht 15.12.2023 09:15:07
  • Zuletzt bearbeitet 13.02.2025 18:15:34

Deserialization of Untrusted Data vulnerability in Apache Dubbo.This issue only affects Apache Dubbo 3.1.5. Users are recommended to upgrade to the latest version, which fixes the issue.

  • EPSS 87.82%
  • Veröffentlicht 15.12.2023 09:15:07
  • Zuletzt bearbeitet 13.02.2025 17:16:18

A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4. Users are recommended to upgrade to the latest version, which fixes the issue.

  • EPSS 68.84%
  • Veröffentlicht 08.03.2023 11:15:10
  • Zuletzt bearbeitet 21.11.2024 07:46:35

A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache D...

Exploit
  • EPSS 15.34%
  • Veröffentlicht 03.01.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 06:07:49

Apache Dubbo is a java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vulnerable to pre-auth remote code execution via arbitrary bean manipulation in the Telnet handler. The Dubbo main service port can be used to access a T...

  • EPSS 7.55%
  • Veröffentlicht 18.10.2022 19:15:10
  • Zuletzt bearbeitet 13.05.2025 15:15:49

A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 an...

  • EPSS 2.27%
  • Veröffentlicht 09.06.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:51:28

bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability.

  • EPSS 46.84%
  • Veröffentlicht 10.01.2022 16:15:09
  • Zuletzt bearbeitet 21.11.2024 06:29:01

A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch une...

  • EPSS 4.56%
  • Veröffentlicht 09.09.2021 08:15:30
  • Zuletzt bearbeitet 21.11.2024 06:15:27

The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and rea...

  • EPSS 2.73%
  • Veröffentlicht 09.09.2021 08:15:28
  • Zuletzt bearbeitet 21.11.2024 06:13:13

Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and ...

  • EPSS 1.2%
  • Veröffentlicht 07.09.2021 10:15:07
  • Zuletzt bearbeitet 21.11.2024 06:13:14

In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the se...