First published: Mon Jun 06 2022(Updated: )
bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Dubbo | <2.6.12 | |
Apache Dubbo | >=2.7.0<2.7.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24969 is a vulnerability in Apache Dubbo prior to version 2.6.12 and 2.7.15 that allows bypassing the white host check, leading to open redirect or SSRF vulnerability.
CVE-2022-24969 affects Apache Dubbo versions prior to 2.6.12 and 2.7.15.
CVE-2022-24969 has a severity level of medium with a CVSS score of 6.1.
CVE-2022-24969 can be exploited by using the parseURL method in Apache Dubbo to bypass the white host check, potentially leading to open redirect or SSRF attacks.
To mitigate CVE-2022-24969, it is recommended to upgrade to Apache Dubbo version 2.6.12 or 2.7.15 or later, which contains a fix for the vulnerability.