mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 01:04:30 +00:00
3.3 KiB
3.3 KiB
CVE-2019-17564
Description
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
POC
Reference
No PoCs from references.
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Dor-Tumarkin/CVE-2019-17564-FastJson-Gadget
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Exploit-3389/CVE-2019-17564
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/Hu3sky/CVE-2019-17564
- https://github.com/Jaky5155/CVE-2019-17564
- https://github.com/Kim-mansoo/2-_-_1343
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/Whoopsunix/PPPRASP
- https://github.com/Whoopsunix/PPPVULNS
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/fairyming/CVE-2019-17564
- https://github.com/goddemondemongod/Sec-Interview
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lnick2023/nicenice
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/lz2y/DubboPOC
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/motikan2010/blog.motikan2010.com
- https://github.com/password520/Penetration_PoC
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/r00t4dm/CVE-2019-17564
- https://github.com/t0m4too/t0m4to
- https://github.com/tdtc7/qps
- https://github.com/threedr3am/dubbo-exp
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji