mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 18:20:53 +00:00
39 lines
1.7 KiB
Markdown
39 lines
1.7 KiB
Markdown
### [CVE-2023-23638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23638)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/3yujw7njai/CVE-2023-23638-Tools
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Armandhe-China/ApacheDubboSerialVuln
|
|
- https://github.com/Awrrays/FrameVul
|
|
- https://github.com/CKevens/CVE-2023-23638-Tools
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CVEDB/top
|
|
- https://github.com/Threekiii/CVE
|
|
- https://github.com/Whoopsunix/PPPVULNS
|
|
- https://github.com/X1r0z/CVE-2023-23638
|
|
- https://github.com/X1r0z/Dubbo-RCE
|
|
- https://github.com/Y4tacker/JavaSec
|
|
- https://github.com/YYHYlh/Apache-Dubbo-CVE-2023-23638-exp
|
|
- https://github.com/YYHYlh/Dubbo-Scan
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/izj007/wechat
|
|
- https://github.com/johe123qwe/github-trending
|
|
- https://github.com/karimhabush/cyberowl
|
|
- https://github.com/muneebaashiq/MBProjects
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/whoami13apt/files2
|
|
- https://github.com/x3t2con/Rttools-2
|
|
|