7.5
CVSSv2

CVE-2021-43297

Published: 10/01/2022 Updated: 18/01/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions before 2.6.12; Apache Dubbo 2.7.x versions before 2.7.15; Apache Dubbo 3.0.x versions before 3.0.5.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache dubbo

Github Repositories

一款让你不只在dubbo-sample、vulhub或者其他测试环境里检测和利用成功的Apache Dubbo 漏洞检测工具。

Dubbo-Scan 一款Apache Dubbo漏洞检测工具。包含了信息收集、参数爆破等功能,利用获取到的信息一键完成对Dubbo的Provider和Consumer的漏洞利用检测。 使用示例见usemd 免责申明 本工具仅用于个人学习行为,如您需要测试本工具的可用性,请自行搭建靶机环境。由于漏洞检测的过程中会存在修改

Apache Dubbo Hessian2 CVE-2021-43297 demo

Apache Dubbo Hessian2异常处理时的反序列化(CVE-2021-43297) 将两个项目分别导入两个idea 先运行orgapachedubbosamplesbasicBasicProvider#main启动服务端 再运行orgapachedubbosamplesbasicBasicConsumer#main启动客户攻击端 效果: paperseebugorg/1814/

CVE-2021-43297 POC,Apache Dubbo<= 2.7.13时可以实现RCE

CVE-2021-43297 漏洞描述 Dubbo Hessian-Lite 3211及之前版本中存在潜在RCE攻击风险。Hessian-Lite在遇到序列化异常时会输出相关信息,这可能导致触发某些恶意定制的Bean的toString方法,从而引发RCE攻击。 原理 最开始的POC只能在Apache Dubbo&lt;=278实现RCE,原理见先知文章(审核通过后回来修改)。投