CWE
502
Advisory Published
Updated

CVE-2021-32824: Regular expression Denial of Service in MooTools

First published: Tue Jan 03 2023(Updated: )

Apache Dubbo is a java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vulnerable to pre-auth remote code execution via arbitrary bean manipulation in the Telnet handler. The Dubbo main service port can be used to access a Telnet Handler which offers some basic methods to collect information about the providers and methods exposed by the service and it can even allow to shutdown the service. This endpoint is unprotected. Additionally, a provider method can be invoked using the `invoke` handler. This handler uses a safe version of FastJson to process the call arguments. However, the resulting list is later processed with `PojoUtils.realize` which can be used to instantiate arbitrary classes and invoke its setters. Even though FastJson is properly protected with a default blocklist, `PojoUtils.realize` is not, and an attacker can leverage that to achieve remote code execution. Versions 2.6.10 and 2.7.10 contain fixes for this issue.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Apache Dubbo<2.6.10
Apache Dubbo>=2.7.0<2.7.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-32824?

    CVE-2021-32824 is a vulnerability in Apache Dubbo, a java based open source RPC framework, that allows for pre-auth remote code execution via arbitrary bean manipulation in the Telnet handler.

  • What is the severity of CVE-2021-32824?

    CVE-2021-32824 has a severity rating of 9.8, which is classified as critical.

  • How can the CVE-2021-32824 vulnerability be exploited?

    The CVE-2021-32824 vulnerability can be exploited through pre-auth remote code execution by manipulating arbitrary beans in the Telnet handler.

  • What versions of Apache Dubbo are affected by CVE-2021-32824?

    Versions of Apache Dubbo prior to 2.6.10 and 2.7.10 are affected by CVE-2021-32824.

  • How can I fix the CVE-2021-32824 vulnerability?

    To fix the CVE-2021-32824 vulnerability, it is recommended to update to Apache Dubbo version 2.6.10 or 2.7.10 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203