First published: Fri Dec 15 2023(Updated: )
A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4. Users are recommended to upgrade to the latest version, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.dubbo:dubbo | >=3.2.0<3.2.5 | 3.2.5 |
maven/org.apache.dubbo:dubbo | >=3.1.0<3.1.11 | 3.1.11 |
Apache Dubbo | >=3.1.0<=3.1.10 | |
Apache Dubbo | >=3.2.0<=3.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29234 is classified as a deserialization vulnerability that could potentially allow for remote code execution.
To mitigate CVE-2023-29234, upgrade Apache Dubbo to version 3.2.5 or 3.1.11 or later.
CVE-2023-29234 affects Apache Dubbo versions from 3.1.0 to 3.1.10 and from 3.2.0 to 3.2.4.
CVE-2023-29234 is a deserialization vulnerability that occurs during the decoding of a malicious package.
If using an affected version of Apache Dubbo, it is recommended to upgrade to the fixed versions as soon as possible.