mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 18:20:53 +00:00
68 lines
3.2 KiB
Markdown
68 lines
3.2 KiB
Markdown
![]() |
### [CVE-2019-17564](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17564)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/BrittanyKuhn/javascript-tutorial
|
||
|
- https://github.com/CnHack3r/Penetration_PoC
|
||
|
- https://github.com/Dor-Tumarkin/CVE-2019-17564-FastJson-Gadget
|
||
|
- https://github.com/EchoGin404/-
|
||
|
- https://github.com/EchoGin404/gongkaishouji
|
||
|
- https://github.com/Exploit-3389/CVE-2019-17564
|
||
|
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/Hu3sky/CVE-2019-17564
|
||
|
- https://github.com/Jaky5155/CVE-2019-17564
|
||
|
- https://github.com/Kim-mansoo/2-_-_1343
|
||
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
||
|
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
|
||
|
- https://github.com/SexyBeast233/SecBooks
|
||
|
- https://github.com/Threekiii/Awesome-Exploit
|
||
|
- https://github.com/Threekiii/Awesome-POC
|
||
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
||
|
- https://github.com/Whoopsunix/PPPRASP
|
||
|
- https://github.com/Whoopsunix/PPPVULNS
|
||
|
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
|
||
|
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
|
||
|
- https://github.com/bakery312/Vulhub-Reproduce
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/fairyming/CVE-2019-17564
|
||
|
- https://github.com/goddemondemongod/Sec-Interview
|
||
|
- https://github.com/hasee2018/Penetration_Testing_POC
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/huike007/penetration_poc
|
||
|
- https://github.com/huike007/poc
|
||
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
|
||
|
- https://github.com/lz2y/DubboPOC
|
||
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||
|
- https://github.com/motikan2010/blog.motikan2010.com
|
||
|
- https://github.com/password520/Penetration_PoC
|
||
|
- https://github.com/pen4uin/awesome-vulnerability-research
|
||
|
- https://github.com/pen4uin/vulnerability-research
|
||
|
- https://github.com/pen4uin/vulnerability-research-list
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/r00t4dm/CVE-2019-17564
|
||
|
- https://github.com/t0m4too/t0m4to
|
||
|
- https://github.com/tdtc7/qps
|
||
|
- https://github.com/threedr3am/dubbo-exp
|
||
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
||
|
- https://github.com/yedada-wei/-
|
||
|
- https://github.com/yedada-wei/gongkaishouji
|
||
|
|