CVE-2022-24969

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24969
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24969.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24969
Aliases
Published
2022-06-09T16:15:08Z
Modified
2024-09-03T04:12:15.717715Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability.

References

Affected packages

Git / github.com/apache/dubbo

Affected ranges

Type
GIT
Repo
https://github.com/apache/dubbo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

dubbo-2.*

dubbo-2.3.1
dubbo-2.3.2
dubbo-2.4.0
dubbo-2.4.1
dubbo-2.4.3
dubbo-2.5.1
dubbo-2.5.10
dubbo-2.5.4
dubbo-2.5.6
dubbo-2.5.7
dubbo-2.5.8
dubbo-2.5.9
dubbo-2.6.0
dubbo-2.6.1
dubbo-2.6.10
dubbo-2.6.11
dubbo-2.6.2
dubbo-2.6.3
dubbo-2.6.4
dubbo-2.6.5
dubbo-2.6.6
dubbo-2.6.8
dubbo-2.6.9