Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache | Apache Dubbo | 2.7.0 to 2.7.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/r00t4dm/CVE-2019-17564 | POC Details |
| 2 | CVE-2019-17564 Apache Dubbo deserialization RCE | https://github.com/Jaky5155/CVE-2019-17564 | POC Details |
| 3 | CVE-2019-17564 : Apache Dubbo Deserialization Remote Code Execution | https://github.com/Hu3sky/CVE-2019-17564 | POC Details |
| 4 | None | https://github.com/Exploit-3389/CVE-2019-17564 | POC Details |
| 5 | Basic code for creating the Alibaba FastJson + Spring gadget chain, as used to exploit Apache Dubbo in CVE-2019-17564 - more information available at https://www.checkmarx.com/blog/apache-dubbo-unauthenticated-remote-code-execution-vulnerability | https://github.com/Dor-Tumarkin/CVE-2019-17564-FastJson-Gadget | POC Details |
| 6 | CVE-2019-17564:Apache Dubbo反序列化漏洞 | https://github.com/fairyming/CVE-2019-17564 | POC Details |
| 7 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Apache%20Dubbo%20Java%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%20CVE-2019-17564.md | POC Details |
| 8 | https://github.com/vulhub/vulhub/blob/master/dubbo/CVE-2019-17564/README.md | POC Details | |
| 9 | Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-17564.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet