Vulnerability Description
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Dubbo | >= 2.5.0, <= 2.5.10 |
Related Weaknesses (CWE)
References
- https://advisory.checkmarx.net/advisory/CX-2020-4275
- https://lists.apache.org/thread.html/r13f7a58fa5d61d729e538a378687118e00c3e22990Mailing ListVendor Advisory
- https://advisory.checkmarx.net/advisory/CX-2020-4275
- https://lists.apache.org/thread.html/r13f7a58fa5d61d729e538a378687118e00c3e22990Mailing ListVendor Advisory
FAQ
What is CVE-2019-17564?
CVE-2019-17564 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of...
How severe is CVE-2019-17564?
CVE-2019-17564 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-17564?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Dubbo.