Information Security 3 min read

Apache Dubbo Deserialization Vulnerability (CVE-2019-17564): Principle, Affected Versions, and Protection Measures

The article explains the deserialization vulnerability (CVE-2019-17564) in Apache Dubbo when using HTTP, lists the impacted 2.5.x, 2.6.x, and 2.7.x versions, and provides mitigation steps including upgrading to 2.7.5 and applying Huawei Cloud WAF rules.

Architect's Tech Stack
Architect's Tech Stack
Architect's Tech Stack
Apache Dubbo Deserialization Vulnerability (CVE-2019-17564): Principle, Affected Versions, and Protection Measures

On February 13, 2020, Huawei Cloud Security detected a serious deserialization vulnerability (CVE-2019-17564) in the widely used Apache Dubbo framework, which allows attackers to execute arbitrary code remotely, potentially compromising the website and leaking data.

Vulnerability Principle : When Apache Dubbo is deployed with the HTTP protocol enabled, an attacker can send a crafted POST request that triggers deserialization without any security checks, allowing execution of arbitrary code. Serialization converts an object to a byte sequence, while deserialization restores it.

Affected Versions : The vulnerability impacts Apache Dubbo versions 2.7.0‑2.7.4, 2.6.0‑2.6.7, and all 2.5.x releases.

Mitigation Options :

Upgrade to the safe version 2.7.5, which can be downloaded from https://github.com/apache/dubbo/tree/dubbo-2.7.5 .

If an immediate upgrade is not possible, use Huawei Cloud Web Application Firewall (WAF) to protect against this and other vulnerabilities. The steps are:

Conclusion : The article asks whether the reader's company uses Dubbo or Spring Cloud and which major version of Dubbo is in use, encouraging further discussion on security practices.

security patchApache DubboWeb Application Firewalldeserialization vulnerabilityCVE-2019-17564Java RPC
Architect's Tech Stack
Written by

Architect's Tech Stack

Java backend, microservices, distributed systems, containerized programming, and more.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.