Deserialization exploitation in Apache Dubbo
Critical severity
GitHub Reviewed
Published
Feb 9, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Package
Affected versions
>= 2.7.0, < 2.7.8
< 2.6.9
Patched versions
2.7.8
2.6.9
Description
Published by the National Vulnerability Database
Jan 11, 2021
Reviewed
Apr 6, 2021
Published to the GitHub Advisory Database
Feb 9, 2022
Last updated
Feb 1, 2023
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be executed after a series of program calls, however, those special functions may cause remote command execution. For example, the hashCode() function of the EqualsBean class in rome-1.7.0.jar will cause the remotely load malicious classes and execute malicious code by constructing a malicious request. This issue was fixed in Apache Dubbo 2.6.9 and 2.7.8.
References