CVE-2021-25641

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-25641
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-25641.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-25641
Aliases
Published
2021-06-01T14:15:09Z
Modified
2024-09-02T22:12:06Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.

References

Affected packages

Git / github.com/apache/dubbo

Affected ranges

Type
GIT
Repo
https://github.com/apache/dubbo
Events