A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4.
Users are recommended to upgrade to the latest version, which fixes the issue.
Users are recommended to upgrade to the latest version, which fixes the issue.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6x49-w35h-wqrj | Bypass serialize checks in Apache Dubbo |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4. Users are recommended to upgrade to the latest version, which fixes the issue. | A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4. Users are recommended to upgrade to the latest version, which fixes the issue. |
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:49:03.349Z
Reserved: 2023-04-04T09:31:05.236Z
Link: CVE-2023-29234
No data.
Status : Modified
Published: 2023-12-15T09:15:07.380
Modified: 2025-02-13T17:16:18.023
Link: CVE-2023-29234
No data.
OpenCVE Enrichment
No data.
Github GHSA