9.8
CVSSv3

CVE-2020-1948

Published: 14/07/2020 Updated: 21/07/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache dubbo

Github Repositories

[CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE

Dubbo-deserialization [CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE Dubbo Study Dubbo-exp Dubbo-poc Dubbo复现环境

JavaRce complements project - use RASP to prevent vulnerabilities

PPPRASP By Whoopsunix why jvm-sandbox? 发现 jvm-sandbox 从 140 开始支持 Native 的增强,正好写一个简单的 RASP Demo 来熟悉这个 AOP 框架(其实是懒得用从头用 ASM 写)。 AOP 框架、沙箱类隔离等架构优点,很难拒绝 基层基于 ASM 实现,框架比较熟悉,后续有更复杂的需求时可以改源码方便 虽然没有