| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09" |
| }, |
| "title": "Apache Dubbo Deserialization Vulnerability Gadgets Bypass", |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "description": "CWE-502 Deserialization of Untrusted Data", |
| "lang": "en", |
| "cweId": "CWE-502", |
| "type": "CWE" |
| } |
| ] |
| } |
| ], |
| "source": { |
| "discovery": "UNKNOWN" |
| }, |
| "affected": [ |
| { |
| "vendor": "Apache Software Foundation", |
| "product": "Apache Dubbo", |
| "versions": [ |
| { |
| "status": "affected", |
| "version": "Apache Dubbo 2.7.x", |
| "lessThanOrEqual": "2.7.21", |
| "versionType": "maven" |
| }, |
| { |
| "status": "affected", |
| "version": "Apache Dubbo 3.0.x", |
| "lessThanOrEqual": "3.0.13", |
| "versionType": "maven" |
| }, |
| { |
| "status": "affected", |
| "version": "Apache Dubbo 3.1.x", |
| "lessThanOrEqual": "3.1.5", |
| "versionType": "maven" |
| } |
| ], |
| "defaultStatus": "unaffected" |
| } |
| ], |
| "descriptions": [ |
| { |
| "value": "A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. \n\nThis issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions. ", |
| "lang": "en", |
| "supportingMedia": [ |
| { |
| "type": "text/html", |
| "base64": false, |
| "value": "A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. <br><br>This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions. " |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://lists.apache.org/thread/8h6zscfzj482z512d2v5ft63hdhzm0cb", |
| "tags": [ |
| "vendor-advisory" |
| ] |
| } |
| ], |
| "metrics": [ |
| { |
| "format": "CVSS", |
| "scenarios": [ |
| { |
| "lang": "en", |
| "value": "GENERAL" |
| } |
| ], |
| "cvssV3_1": { |
| "version": "3.1", |
| "attackVector": "NETWORK", |
| "attackComplexity": "HIGH", |
| "privilegesRequired": "LOW", |
| "userInteraction": "NONE", |
| "scope": "UNCHANGED", |
| "confidentialityImpact": "LOW", |
| "integrityImpact": "LOW", |
| "availabilityImpact": "LOW", |
| "baseSeverity": "MEDIUM", |
| "baseScore": 5, |
| "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" |
| } |
| } |
| ], |
| "credits": [ |
| { |
| "lang": "en", |
| "value": "yemoli\u3001R1ckyZ\u3001Koishi\u3001cxc", |
| "type": "reporter" |
| } |
| ], |
| "x_generator": { |
| "engine": "Vulnogram 0.1.0-dev" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "cveId": "CVE-2023-23638", |
| "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", |
| "serial": 1, |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |