Critical Apache Dubbo CVE-2021-43297 Vulnerability: Risks and Fixes

On January 14, 2022, 360CERT reported a high‑severity CVE‑2021‑43297 deserialization flaw in Apache Dubbo’s hessian‑lite (up to version 3.2.11) that can lead to remote code execution, detailing its impact, affected versions, risk rating, and recommending immediate upgrades to safe releases.

Programmer DD
Programmer DD
Programmer DD
Critical Apache Dubbo CVE-2021-43297 Vulnerability: Risks and Fixes

1 Vulnerability Overview

On 2022-01-14, 360CERT observed that Apache released a security advisory for Apache Dubbo hessian-lite, identifying CVE-2021-43297 as a high-severity (CVSS 7.5) vulnerability.

Dubbo is a high-performance, lightweight open-source Java RPC framework offering interface-based remote method calls, intelligent fault tolerance and load balancing, and automatic service registration and discovery.

360CERT recommends users upgrade Apache Dubbo to the latest version and perform asset checks to prevent attacks.

2 Risk Rating

360CERT’s assessment rates the vulnerability as high severity.

3 Vulnerability Details

CVE-2021-43297: Apache Dubbo Code Execution Vulnerability

CVE: CVE-2021-43297

Component: Apache Dubbo

Vulnerability Type: Deserialization

Impact: Remote code execution

Description: Apache Dubbo hessian-lite versions up to 3.2.11 contain a deserialization flaw. Most Dubbo users default to the Hessian2 protocol; when Hessian encounters an exception it may log user information, potentially allowing remote command execution.

4 Affected Versions

5 Mitigation Recommendations

General Patch Advice

Based on the affected versions information, identify and upgrade to the secure version. Download links: https://github.com/apache/dubbo/releases

6 Timeline

2022-01-09 Apache official advisory released

2022-01-14 360CERT advisory published

7 References

https://lists.apache.org/thread/1mszxrvp90y01xob56yp002939c7hlww

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Remote Code ExecutionApache Dubbodeserialization vulnerabilitySecurity AdvisoryCVE-2021-43297
Programmer DD
Written by

Programmer DD

A tinkering programmer and author of "Spring Cloud Microservices in Action"

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.