org.apache.dubbo:dubbo-rpc@2.7.6 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.dubbo:dubbo-rpc package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Deserialization of Untrusted Data

org.apache.dubbo:dubbo-rpc is a high-performance, java based, open source RPC framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton. New HessianSkeletons are created without any configuration of the serialization factory and therefore without applying the Dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed. Therefore, attackers do not need to figure out a valid service/method name pair.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.dubbo:dubbo-rpc to version 2.7.13, 2.6.10.1 or higher.

[2.7.0,2.7.13) [,2.6.10.1)
  • H
Deserialization of Untrusted Data

org.apache.dubbo:dubbo-rpc is a high-performance, java based, open source RPC framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker can send RPC requests with unrecognized service name or method name along with malicious parameter payloads. When the malicious parameter is deserialized, it will execute malicious code.

How to fix Deserialization of Untrusted Data?

Upgrade org.apache.dubbo:dubbo-rpc to version 2.7.8 or higher.

[,2.7.8)