### [CVE-2019-17564](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17564) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Dubbo&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Unsafe%20deserialization&color=brighgreen) ### Description Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet - https://github.com/BrittanyKuhn/javascript-tutorial - https://github.com/CnHack3r/Penetration_PoC - https://github.com/Dor-Tumarkin/CVE-2019-17564-FastJson-Gadget - https://github.com/EchoGin404/- - https://github.com/EchoGin404/gongkaishouji - https://github.com/Exploit-3389/CVE-2019-17564 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/Hu3sky/CVE-2019-17564 - https://github.com/Jaky5155/CVE-2019-17564 - https://github.com/Kim-mansoo/2-_-_1343 - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/SexyBeast233/SecBooks - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/Tyro-Shan/gongkaishouji - https://github.com/Whoopsunix/PPPRASP - https://github.com/Whoopsunix/PPPVULNS - https://github.com/YIXINSHUWU/Penetration_Testing_POC - https://github.com/ZTK-009/Penetration_PoC - https://github.com/apachecn-archive/Middleware-Vulnerability-detection - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/fairyming/CVE-2019-17564 - https://github.com/goddemondemongod/Sec-Interview - https://github.com/hasee2018/Penetration_Testing_POC - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/huike007/penetration_poc - https://github.com/huike007/poc - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/lnick2023/nicenice - https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection - https://github.com/lz2y/DubboPOC - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet - https://github.com/motikan2010/blog.motikan2010.com - https://github.com/password520/Penetration_PoC - https://github.com/pen4uin/awesome-vulnerability-research - https://github.com/pen4uin/vulnerability-research - https://github.com/pen4uin/vulnerability-research-list - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/r00t4dm/CVE-2019-17564 - https://github.com/t0m4too/t0m4to - https://github.com/tdtc7/qps - https://github.com/threedr3am/dubbo-exp - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/yedada-wei/- - https://github.com/yedada-wei/gongkaishouji