A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/1mszxrvp90y01xob56yp002939c7hlww | Mailing List Vendor Advisory |
https://lists.apache.org/thread/1mszxrvp90y01xob56yp002939c7hlww | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread/1mszxrvp90y01xob56yp002939c7hlww - Mailing List, Vendor Advisory |
Information
Published : 2022-01-10 16:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43297
Mitre link : CVE-2021-43297
CVE.ORG link : CVE-2021-43297
JSON object : View
Products Affected
apache
- dubbo
CWE
CWE-502
Deserialization of Untrusted Data