Description
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
Remediation
References
https://nsfocusglobal.com/apache-dubbo-remote-code-execution-vulnerability-cve-2020-1948-threat-alert/
https://lists.apache.org/thread.html/rbaa41711b3e7a8cd20e9013737423ddd079ddc12f90180f86e76523c%40%3Csecurity.dubbo.apache.org%3E
Related Vulnerabilities
CVE-2021-33604 Vulnerability in maven package com.vaadin:flow-server
CVE-2022-31179 Vulnerability in npm package shescape
CVE-2022-45210 Vulnerability in maven package org.jeecgframework.boot:jeecg-module-system
CVE-2021-41182 Vulnerability in maven package org.webjars.npm:jquery-ui
CVE-2019-10295 Vulnerability in maven package org.jenkins-ci.plugins:crittercism-dsym