A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vp5x-3v8r-qprw | Deserialization of Untrusted Data in Dubbo |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T03:55:28.375Z
Reserved: 2021-11-03T00:00:00
Link: CVE-2021-43297
No data.
Status : Modified
Published: 2022-01-10T16:15:09.527
Modified: 2024-11-21T06:29:01.710
Link: CVE-2021-43297
No data.
OpenCVE Enrichment
No data.
Github GHSA