Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
References
- https://nvd.nist.gov/vuln/detail/CVE-2019-17564
- https://advisory.checkmarx.net/advisory/CX-2020-4275
- https://lists.apache.org/thread.html/r13f7a58fa5d61d729e538a378687118e00c3e229903ba1e7b3a807a2%40%3Cdev.dubbo.apache.org%3E
- https://github.com/apache/dubbo/commit/9b18fe228971eaeca9b87d7b7e95df1c2a8ff91b
- https://github.com/apache/dubbo/releases/tag/dubbo-2.7.5
- https://github.com/advisories/GHSA-69wp-3pm3-hxgg