VYPR
Critical severityNVD Advisory· Published May 31, 2021· Updated Aug 3, 2024

Apache Dubbo RCE on customers via Condition route poisoning (Unsafe YAML unmarshaling)

CVE-2021-30180

Description

Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Dubbo before 2.7.9 allows arbitrary constructor invocation via YAML tag routing rule parsing, leading to remote code execution.

Vulnerability

Apache Dubbo versions prior to 2.7.9 support Tag routing, a feature that enables customers to define YAML rules to route requests to appropriate servers. The vulnerability resides in the parsing of these YAML rules. Due to insufficient input validation, an attacker can craft malicious YAML content that causes the application to invoke arbitrary constructors during deserialization [1]. This allows the instantiation of classes with attacker-controlled parameters.

Exploitation

To exploit this vulnerability, an attacker must have the ability to provide or modify the YAML tag routing rules used by a Dubbo customer. This may require network access to the configuration management system or the ability to inject malicious rules through a compromised provider or consumer. The attacker crafts a YAML rule that specifies a class constructor target, which is then invoked during parsing. No authentication is required if the attacker can control the rule input directly.

Impact

Successful exploitation allows the attacker to execute arbitrary code on the Dubbo server. By invoking arbitrary constructors, the attacker can instantiate classes and potentially execute commands or gain full remote code execution (RCE) depending on the available classes and environment. This compromises the confidentiality, integrity, and availability of the affected system.

Mitigation

Apache Dubbo fixed this vulnerability in version 2.7.9. Users should upgrade to Apache Dubbo 2.7.9 or later [1]. There is no known workaround if the system cannot be upgraded. The CVE is not listed in CISA's Known Exploited Vulnerabilities catalog as of the publication date.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.dubbo:dubboMaven
>= 2.7.0, < 2.7.102.7.10

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.