Apache Dubbo vulnerabilities

19 known vulnerabilities affecting apache/dubbo.

Total CVEs
19
CISA KEV
0
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL16HIGH1MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2023-46279CRITICALCVSS 9.8v3.1.52023-12-15
CVE-2023-46279 [CRITICAL] CWE-502 CVE-2023-46279: Deserialization of Untrusted Data vulnerability in Apache Dubbo.This issue only affects Apache Dubbo Deserialization of Untrusted Data vulnerability in Apache Dubbo.This issue only affects Apache Dubbo 3.1.5. Users are recommended to upgrade to the latest version, which fixes the issue.
nvd
CVE-2023-29234CRITICALCVSS 9.8≥ 3.1.0, ≤ 3.1.10≥ 3.2.0, ≤ 3.2.42023-12-15
CVE-2023-29234 [CRITICAL] CWE-502 CVE-2023-29234: A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Du A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4. Users are recommended to upgrade to the latest version, which fixes the issue.
nvd
CVE-2023-23638CRITICALCVSS 9.8≥ 2.7.0, ≤ 2.7.21≥ 3.0.0, ≤ 3.0.13+1 more2023-03-08
CVE-2023-23638 [MEDIUM] CWE-502 CVE-2023-23638: A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious cod A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions.
nvd
CVE-2021-32824CRITICALCVSS 9.8fixed in 2.6.10≥ 2.7.0, < 2.7.10+3 more2023-01-03
CVE-2021-32824 [CRITICAL] CWE-502 CVE-2021-32824: Apache Dubbo is a java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vul Apache Dubbo is a java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vulnerable to pre-auth remote code execution via arbitrary bean manipulation in the Telnet handler. The Dubbo main service port can be used to access a Telnet Handler which offers some basic methods to collect information about the providers and method
cvelistv5nvd
CVE-2022-39198CRITICALCVSS 9.8≥ 2.7.0, ≤ 2.7.17≥ 3.0.0, ≤ 3.0.11+1 more2022-10-18
CVE-2022-39198 [CRITICAL] CWE-502 CVE-2022-39198: A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 and prior versions; Apache Dubbo 3.1.x version 3.1.0 and prior versions.
nvd
CVE-2022-24969MEDIUMCVSS 6.1fixed in 2.6.12≥ 2.7.0, < 2.7.152022-06-09
CVE-2022-24969 [MEDIUM] CVE-2022-24969: bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method wil bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability.
nvd
CVE-2021-43297CRITICALCVSS 9.8≥ 2.6.0, < 2.6.12≥ 2.7.0, < 2.7.15+1 more2022-01-10
CVE-2021-43297 [CRITICAL] CWE-502 CVE-2021-43297: A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command
nvd
CVE-2021-37579CRITICALCVSS 9.8≥ 2.7.0, < 2.7.13≥ 3.0.0, < 3.0.22021-09-09
CVE-2021-37579 [CRITICAL] CWE-502 CVE-2021-37579: The Dubbo Provider will check the incoming request and the corresponding serialization type of this The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed t
nvd
CVE-2021-36161CRITICALCVSS 9.8≥ 2.7.0, < 2.7.132021-09-09
CVE-2021-36161 [CRITICAL] CWE-134 CVE-2021-36161: Some component in Dubbo will try to print the formated string of the input arguments, which will pos Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13
nvd
CVE-2021-36163CRITICALCVSS 9.8≥ 2.7.0, ≤ 2.7.12≥ 3.0.0, ≤ 3.0.12021-09-07
CVE-2021-36163 [CRITICAL] CWE-502 CVE-2021-36163: In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented o In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blo
nvd
CVE-2021-36162HIGHCVSS 8.8≥ 2.7.0, ≤ 2.7.12≥ 3.0.0, ≤ 3.0.12021-09-07
CVE-2021-36162 [HIGH] CVE-2021-36162: Apache Dubbo supports various rules to support configuration override or traffic routing (called rou Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library
nvd
CVE-2021-30180CRITICALCVSS 9.8≥ 2.7.0, < 2.7.102021-06-01
CVE-2021-30180 [CRITICAL] CWE-444 CVE-2021-30180: Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.
nvd
CVE-2021-30179CRITICALCVSS 9.8≥ 2.5.0, ≤ 2.5.10≥ 2.6.0, < 2.6.9+1 more2021-06-01
CVE-2021-30179 [CRITICAL] CWE-502 CVE-2021-30179: Apache Dubbo prior to 2.6.9 and 2.7.9 by default supports generic calls to arbitrary methods exposed Apache Dubbo prior to 2.6.9 and 2.7.9 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final call. The signature for the $invo
nvd
CVE-2021-25641CRITICALCVSS 9.8≥ 2.5.0, < 2.6.9≥ 2.7.0, < 2.7.82021-06-01
CVE-2021-25641 [CRITICAL] CWE-502 CVE-2021-25641: Each Apache Dubbo server will set a serialization id to tell the clients which serialization protoco Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak d
nvd
CVE-2021-30181CRITICALCVSS 9.8≥ 2.5.0, < 2.6.10≥ 2.7.0, < 2.7.102021-06-01
CVE-2021-30181 [CRITICAL] CVE-2021-30181: Apache Dubbo prior to 2.6.9 and 2.7.9 supports Script routing which will enable a customer to route Apache Dubbo prior to 2.6.9 and 2.7.9 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by the script which by default may enable e
nvd
CVE-2021-25640MEDIUMCVSS 6.1≥ 2.5.0, < 2.6.9≥ 2.7.0, < 2.7.92021-06-01
CVE-2021-25640 [MEDIUM] CWE-918 CVE-2021-25640: In Apache Dubbo prior to 2.6.9 and 2.7.9, the usage of parseURL method will lead to the bypass of wh In Apache Dubbo prior to 2.6.9 and 2.7.9, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability.
nvd
CVE-2020-11995CRITICALCVSS 9.8≥ 2.5.0, ≤ 2.5.10≥ 2.6.0, ≤ 2.6.8+1 more2021-01-11
CVE-2020-11995 [CRITICAL] CWE-502 CVE-2020-11995: A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HasMap will be executed after a series of progra
nvd
CVE-2020-1948CRITICALCVSS 9.8≥ 2.5.0, ≤ 2.5.10≥ 2.6.0, ≤ 2.6.7+1 more2020-07-14
CVE-2020-1948 [CRITICAL] CWE-502 CVE-2020-1948: This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send R This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
nvd
CVE-2019-17564CRITICALCVSS 9.8ExploitedPoC≥ 2.5.0, ≤ 2.5.10≥ 2.6.0, ≤ 2.6.7+1 more2020-04-01
CVE-2019-17564 [CRITICAL] CWE-502 CVE-2019-17564: Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacke Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
nvd