Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-25641 PoC — Dubbo Zookeeper does not check serialization id

Source
Associated Vulnerability
Title:Dubbo Zookeeper does not check serialization id (CVE-2021-25641)
Description:Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it.
Description
A Exploit Tool For CVE-2021-25641.
Readme
# CVE-2021-25641
A Exploit Tool For CVE-2021-25641.

All dependencies was packed,You don't care the dependencies problem</br>
If you have dependencies you can just donwload the CVE-2021-25641.jar to run.

## Used for:
Basic dubbo-common <=2.7.3</br>
Dubbo 2.7.0 to 2.7.8</br>
Dubbo 2.6.0 to 2.6.9</br>
Dubbo all 2.5.x versions (not supported by official team any longer)
File Snapshot

[4.0K] /data/pocs/515fd1dd2095dafd85fc58282d21aab097f80f36 ├── [ 52K] asm-5.0.4.jar ├── [ 60K] commons-logging-1.2.jar ├── [ 11K] CVE-2021-25641.jar ├── [2.2M] dubbo-2.7.3.jar ├── [318K] dubbo-common-2.6.9.jar ├── [361K] dubbo-common-2.7.3.jar ├── [159K] dubbo-remoting-api-2.6.9.jar ├── [ 36K] dubbo-remoting-netty4-2.6.9.jar ├── [ 12K] dubbo-serialization-api-2.6.9.jar ├── [528K] fastjson-1.2.46.jar ├── [372K] fst-2.48-jdk-6.jar ├── [236K] gson-2.8.5.jar ├── [231K] hessian-lite-3.2.5.jar ├── [275K] jackson-core-2.8.6.jar ├── [733K] javassist-3.20.0-GA.jar ├── [ 57K] java-util-1.9.0.jar ├── [ 73K] json-io-2.5.1.jar ├── [329K] kryo-4.0.1.jar ├── [104K] kryo-serializers-0.42.jar ├── [470K] log4j-1.2.16.jar ├── [5.6K] minlog-1.3.0.jar ├── [4.2M] netty-all-4.1.60.Final.jar ├── [ 53K] objenesis-2.5.1.jar ├── [ 15K] permit-reflect-0.4.jar ├── [ 371] README.md ├── [ 20K] reflectasm-1.11.3.jar ├── [292K] snakeyaml-1.20.jar ├── [371K] spring-aop-4.3.16.RELEASE.jar ├── [658K] spring-beans-5.1.9.RELEASE.jar ├── [1.1M] spring-context-4.3.16.RELEASE.jar ├── [1.2M] spring-core-5.1.9.RELEASE.jar ├── [266K] spring-expression-4.3.16.RELEASE.jar ├── [ 23K] spring-jcl-5.1.9.RELEASE.jar └── [1.3M] spring-web-5.1.9.RELEASE.jar 0 directories, 34 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →