Miggo Logo

CVE-2021-32824: Apache Dubbo vulnerable to remote code execution via Telnet Handler

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.93873%
Published
1/3/2023
Updated
1/29/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.dubbo:dubbo-parentmaven< 2.6.102.6.10
org.apache.dubbo:dubbo-parentmaven>= 2.7.0, < 2.7.102.7.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The core vulnerability stems from two key points: 1) The Telnet handler's invoke command accepts untrusted input and processes arguments through PojoUtils.realize. 2) PojoUtils.realize lacks the deserialization protections present in FastJson, allowing arbitrary class instantiation. The combination creates an unprotected RCE vector where attackers can manipulate beans through nested object graphs that trigger dangerous setters or constructors.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** *u**o is * J*v* **s**, op*n sour** RP* *r*m*work. V*rsions prior to *.*.** *n* *.*.** *r* vuln*r**l* to pr*-*ut*oriz*tion r*mot* *o** *x**ution vi* *r*itr*ry ***n m*nipul*tion in t** T*ln*t **n*l*r. T** *u**o m*in s*rvi** port **n ** us** to *

Reasoning

T** *or* vuln*r**ility st*ms *rom two k*y points: *) T** T*ln*t **n*l*r's invok* *omm*n* ****pts untrust** input *n* pro**ss*s *r*um*nts t*rou** PojoUtils.r**liz*. *) PojoUtils.r**liz* l**ks t** **s*ri*liz*tion prot**tions pr*s*nt in **stJson, *llowi