### [CVE-2023-23638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23638) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Dubbo&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Apache%20Dubbo%202.7.x%3C%3D%202.7.21%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen) ### Description A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions. ### POC #### Reference No PoCs from references. #### Github - https://github.com/3yujw7njai/CVE-2023-23638-Tools - https://github.com/ARPSyndicate/cvemon - https://github.com/Armandhe-China/ApacheDubboSerialVuln - https://github.com/Awrrays/FrameVul - https://github.com/CKevens/CVE-2023-23638-Tools - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/Threekiii/CVE - https://github.com/Whoopsunix/PPPVULNS - https://github.com/X1r0z/CVE-2023-23638 - https://github.com/X1r0z/Dubbo-RCE - https://github.com/Y4tacker/JavaSec - https://github.com/YYHYlh/Apache-Dubbo-CVE-2023-23638-exp - https://github.com/YYHYlh/Dubbo-Scan - https://github.com/hktalent/TOP - https://github.com/izj007/wechat - https://github.com/johe123qwe/github-trending - https://github.com/karimhabush/cyberowl - https://github.com/muneebaashiq/MBProjects - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/whoami13apt/files2 - https://github.com/x3t2con/Rttools-2