CVE-2020-1948

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-1948
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-1948.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-1948
Aliases
Published
2020-07-14T14:15:17Z
Modified
2024-10-12T06:18:40.557214Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.

References

Affected packages

Git / github.com/apache/dubbo

Affected versions

dubbo-2.*

dubbo-2.5.10
dubbo-2.5.9
dubbo-2.6.0
dubbo-2.7.0