Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cpx9-4rwv-486v

Опубликовано: 08 сент. 2021
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Hessian protocol configuration vulnerability in Apache Dubbo

In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1

Пакеты

Наименование

org.apache.dubbo:dubbo

maven
Затронутые версииВерсия исправления

>= 2.7.0, < 2.7.13

2.7.13

Наименование

org.apache.dubbo:dubbo

maven
Затронутые версииВерсия исправления

<= 2.6.10

2.6.10.1

EPSS

Процентиль: 81%
0.01617
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1

EPSS

Процентиль: 81%
0.01617
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502