cve/2019/CVE-2019-17564.md

70 lines
3.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-17564](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17564)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Dubbo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Unsafe%20deserialization&color=brighgreen)
### Description
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Dor-Tumarkin/CVE-2019-17564-FastJson-Gadget
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Exploit-3389/CVE-2019-17564
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/Hu3sky/CVE-2019-17564
- https://github.com/Jaky5155/CVE-2019-17564
- https://github.com/Kim-mansoo/2-_-_1343
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
2024-06-07 04:52:01 +00:00
- https://github.com/Tyro-Shan/gongkaishouji
2024-05-26 14:27:05 +02:00
- https://github.com/Whoopsunix/PPPRASP
- https://github.com/Whoopsunix/PPPVULNS
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/Penetration_PoC
2024-05-26 14:27:05 +02:00
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/fairyming/CVE-2019-17564
- https://github.com/goddemondemongod/Sec-Interview
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lnick2023/nicenice
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/lz2y/DubboPOC
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/motikan2010/blog.motikan2010.com
- https://github.com/password520/Penetration_PoC
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/r00t4dm/CVE-2019-17564
- https://github.com/t0m4too/t0m4to
- https://github.com/tdtc7/qps
- https://github.com/threedr3am/dubbo-exp
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji