VYPR
Critical severityNVD Advisory· Published Sep 9, 2021· Updated Aug 4, 2024

Unprotected input value toString cause RCE

CVE-2021-36161

Description

Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Dubbo 2.7.12 and earlier allow RCE via deserialization of beans with malicious toString methods during formatting.

Vulnerability

In Apache Dubbo versions 2.7.12 and earlier, multiple components (including timeout and cache handling) format input arguments by calling their toString() method. A specially crafted bean with a malicious toString() implementation can trigger arbitrary code execution during this formatting process [1]. This issue is located in the object deserialization and argument printing routines [2].

Exploitation

An attacker must be able to supply a maliciously customized bean to a Dubbo service endpoint. No authentication is required if the service endpoint is exposed. The attacker crafts a Java bean whose toString() method executes arbitrary commands. When Dubbo's internal formatting logic calls toString() on that bean during argument processing (e.g., when printing timeout or cache-related messages), the malicious code executes [1].

Impact

Successful exploitation allows remote code execution (RCE) on the server hosting the Dubbo service. The attacker gains full control over the JVM process, enabling data exfiltration, lateral movement, or further compromise of the infrastructure [1].

Mitigation

Apache Dubbo 2.7.13 fixes the issue by removing unnecessary toString() calls in affected components (timeout, cache, and other locations) [1]. Users should upgrade to Dubbo 2.7.13 or later immediately. No workarounds are documented; services exposed to untrusted input are at risk until patched [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.dubbo:dubboMaven
< 2.7.132.7.13

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.