CVE-2020-11995

Severity
9.8CRITICAL
EPSS
1.8%
top 17.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 11
Latest updateFeb 9

Description

A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HasMap will be executed after a series of program calls, however, those special functions may cause remote command execution. For example, the hashCode() function of the EqualsBean class in rome-1.7.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Mavenorg.apache.dubbo:dubbo-parent2.7.02.7.8+1
CVEListV5apache_software_foundation/apache_dubboApache Dubbo2.6.9
NVDapache/dubbo2.5.02.5.10+2

🔴Vulnerability Details

3
GHSA
Deserialization exploitation in Apache Dubbo2022-02-09
OSV
Deserialization exploitation in Apache Dubbo2022-02-09
CVEList
Apache Dubbo default deserialization protocol Hessian2 cause CRE2021-01-11
CVE-2020-11995 (CRITICAL CVSS 9.8) | A deserialization vulnerability exi | cvebase.io