| { | |
| "schema_version": "1.4.0", | |
| "id": "GHSA-7wfc-x4f7-gg2x", | |
| "modified": "2022-03-18T17:58:01Z", | |
| "published": "2022-03-18T17:58:01Z", | |
| "aliases": [ | |
| "CVE-2021-30180" | |
| ], | |
| "summary": "Code injection in Apache Dubbo", | |
| "details": "Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.", | |
| "severity": [ | |
| { | |
| "type": "CVSS_V3", | |
| "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" | |
| } | |
| ], | |
| "affected": [ | |
| { | |
| "package": { | |
| "ecosystem": "Maven", | |
| "name": "org.apache.dubbo:dubbo" | |
| }, | |
| "ranges": [ | |
| { | |
| "type": "ECOSYSTEM", | |
| "events": [ | |
| { | |
| "introduced": "2.7.0" | |
| }, | |
| { | |
| "fixed": "2.7.10" | |
| } | |
| ] | |
| } | |
| ] | |
| } | |
| ], | |
| "references": [ | |
| { | |
| "type": "ADVISORY", | |
| "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30180" | |
| }, | |
| { | |
| "type": "WEB", | |
| "url": "https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E" | |
| } | |
| ], | |
| "database_specific": { | |
| "cwe_ids": [ | |
| "CWE-444", | |
| "CWE-94" | |
| ], | |
| "severity": "CRITICAL", | |
| "github_reviewed": true, | |
| "github_reviewed_at": "2021-06-02T20:19:48Z", | |
| "nvd_published_at": "2021-06-01T14:15:00Z" | |
| } | |
| } |