A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions.
No PoCs from references.
- https://github.com/20142995/sectool
- https://github.com/3yujw7njai/CVE-2023-23638-Tools
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AiK1d/CVE-2023-23638-Tools
- https://github.com/Armandhe-China/ApacheDubboSerialVuln
- https://github.com/Awrrays/FrameVul
- https://github.com/CKevens/CVE-2023-23638-Tools
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/P4x1s/CVE-2023-23638-Tools
- https://github.com/Threekiii/CVE
- https://github.com/Whoopsunix/PPPVULNS
- https://github.com/X1r0z/CVE-2023-23638
- https://github.com/X1r0z/Dubbo-RCE
- https://github.com/Y4tacker/JavaSec
- https://github.com/YYHYlh/Apache-Dubbo-CVE-2023-23638-exp
- https://github.com/YYHYlh/Dubbo-Scan
- https://github.com/bright-angel/sec-repos
- https://github.com/cc8700619/poc
- https://github.com/cuijiung/dubbo-CVE-2023-23638
- https://github.com/dayutech/ApacheDubboSerialVuln
- https://github.com/hktalent/TOP
- https://github.com/izj007/wechat
- https://github.com/johe123qwe/github-trending
- https://github.com/karimhabush/cyberowl
- https://github.com/muneebaashiq/MBProjects
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tabby-sec/tabby
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/wh1t3p1g/tabby
- https://github.com/whoami13apt/files2
- https://github.com/x3t2con/Rttools-2