Dubbo Hessian cause RCE when parse error
CVE-2021-43297
Key Information:
- Vendor
- Apache
- Status
- Vendor
- CVE Published:
- 10 January 2022
Badges
Summary
A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
Affected Version(s)
Apache Dubbo Apache Dubbo 2.6.x < 2.6.12
Apache Dubbo Apache Dubbo 2.7.x < 2.7.15
Apache Dubbo Apache Dubbo 3.0.x < 3.0.5
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved