Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.dubbo/dubbo-parent
  4. ›
  5. CVE-2020-11995

CVE-2020-11995: Deserialization of Untrusted Data

February 9, 2022

A deserialization vulnerability existed in dubbo and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HasMap will be executed after a series of program calls, however, those special functions may cause remote command execution.

References

  • github.com/advisories/GHSA-74mg-6xqx-2vrq
  • github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab
  • lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubbo.apache.org%3E
  • nvd.nist.gov/vuln/detail/CVE-2020-11995

Code Behaviors & Features

Detect and mitigate CVE-2020-11995 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.7.0 before 2.7.8, all versions before 2.6.9

Fixed versions

  • 2.6.9

Solution

Upgrade to version 2.6.9 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

maven/org.apache.dubbo/dubbo-parent/CVE-2020-11995.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:19 +0000.