Hessian protocol configuration vulnerability in Apache Dubbo
Critical severity
GitHub Reviewed
Published
Sep 8, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Package
Affected versions
>= 2.7.0, < 2.7.13
<= 2.6.10
Patched versions
2.7.13
2.6.10.1
Description
Published by the National Vulnerability Database
Sep 7, 2021
Reviewed
Sep 8, 2021
Published to the GitHub Advisory Database
Sep 8, 2021
Last updated
Feb 1, 2023
In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
References