GHSA-6x49-w35h-wqrj

Suggest an improvement
Source
https://github.com/advisories/GHSA-6x49-w35h-wqrj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-6x49-w35h-wqrj/GHSA-6x49-w35h-wqrj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6x49-w35h-wqrj
Aliases
Published
2023-12-15T09:30:17Z
Modified
2024-12-03T06:16:10.242579Z
Summary
Bypass serialize checks in Apache Dubbo
Details

A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4.

Users are recommended to upgrade to the latest version, which fixes the issue.

Database specific
{
    "nvd_published_at": "2023-12-15T09:15:07Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-12-15T23:20:28Z"
}
References

Affected packages

Maven / org.apache.dubbo:dubbo

Package

Name
org.apache.dubbo:dubbo
View open source insights on deps.dev
Purl
pkg:maven/org.apache.dubbo/dubbo

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.1.0
Fixed
3.1.11

Affected versions

3.*

3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9
3.1.10

Maven / org.apache.dubbo:dubbo

Package

Name
org.apache.dubbo:dubbo
View open source insights on deps.dev
Purl
pkg:maven/org.apache.dubbo/dubbo

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.2.0
Fixed
3.2.5

Affected versions

3.*

3.2.0
3.2.1
3.2.2
3.2.3
3.2.4