Apache Dubbo: Bypass deny serialize list check in Apache Dubbo
CVE-2023-46279
9.8CRITICAL
Summary
A deserialization of untrusted data vulnerability has been identified in Apache Dubbo, specifically in version 3.1.5. This flaw could potentially allow an attacker to exploit the system by manipulating data during the deserialization process. It is crucial for users to upgrade to the latest version of Apache Dubbo to mitigate this vulnerability and ensure their systems remain secure.
Affected Version(s)
Apache Dubbo 3.1.5
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved