9/9/2021
4/8/2024
CVE-2021-36161: Unprotected input value toString cause RCE
First published: Thu Sep 09 2021(Updated: )
Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|
Apache Dubbo | >=2.7.0<2.7.13 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is CVE-2021-36161?
CVE-2021-36161 is a vulnerability in Apache Dubbo that allows a maliciously crafted bean with a special toString method to execute arbitrary code (RCE).
How severe is the CVE-2021-36161 vulnerability?
The severity of CVE-2021-36161 is critical with a severity value of 9.8.
How can I fix CVE-2021-36161?
To fix CVE-2021-36161, update Apache Dubbo to the latest version (2.7.13).
Is Apache Dubbo version 2.7.13 affected by CVE-2021-36161?
No, Apache Dubbo version 2.7.13 is not affected by CVE-2021-36161 as it includes a fix for the vulnerability.
What is CWE-134?
CWE-134 is a Common Weakness Enumeration category that refers to the incorrect handling of a format string.
- collector/nvd-index
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/severity
- agent/weakness
- agent/title
- agent/last-modified-date
- agent/author
- agent/references
- agent/event
- agent/tags
- agent/description
- agent/first-publish-date
- vendor/apache
- canonical/apache dubbo
- version/apache dubbo/2.7.0
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203