Apache

Dubbo

19 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1%
  • Published 07.09.2021 10:15:07
  • Last modified 21.11.2024 06:13:14

Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request ...

  • EPSS 3.31%
  • Published 01.06.2021 14:15:09
  • Last modified 21.11.2024 06:03:28

Apache Dubbo prior to 2.6.9 and 2.7.9 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these r...

  • EPSS 3.16%
  • Published 01.06.2021 14:15:09
  • Last modified 21.11.2024 06:03:28

Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dub...

  • EPSS 3.58%
  • Published 01.06.2021 14:15:09
  • Last modified 21.11.2024 06:03:28

Apache Dubbo prior to 2.6.9 and 2.7.9 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of...

  • EPSS 74.8%
  • Published 01.06.2021 14:15:09
  • Last modified 21.11.2024 05:55:11

Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering wit...

  • EPSS 0.22%
  • Published 01.06.2021 14:15:09
  • Last modified 21.11.2024 05:55:11

In Apache Dubbo prior to 2.6.9 and 2.7.9, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability.

  • EPSS 1.42%
  • Published 11.01.2021 10:15:13
  • Last modified 21.11.2024 04:59:04

A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashM...

  • EPSS 68%
  • Published 14.07.2020 14:15:17
  • Last modified 21.11.2024 05:11:42

This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, ...

  • EPSS 93.47%
  • Published 01.04.2020 22:15:15
  • Last modified 21.11.2024 04:32:32

Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This...