CVE-2022-45378

In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/11/14/4 Mailing List Third Party Advisory
https://lists.apache.org/thread/g4l64s283njhnph2otx7q4gs2j952d31 Mailing List Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:soap:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:54

Type Values Removed Values Added
Summary ** UNSUPPPORTED WHEN ASSIGNED ** In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

27 Jun 2023, 13:15

Type Values Removed Values Added
Summary ** UNSUPPPORTED WHEN ASSIGNED **In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** UNSUPPPORTED WHEN ASSIGNED ** In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

27 Jun 2023, 02:41

Type Values Removed Values Added
CWE CWE-287 CWE-306

20 Dec 2022, 14:15

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** UNSUPPPORTED WHEN ASSIGNED **In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

16 Nov 2022, 18:57

Type Values Removed Values Added
CPE cpe:2.3:a:apache:soap:*:*:*:*:*:*:*:*
References (CONFIRM) https://lists.apache.org/thread/g4l64s283njhnph2otx7q4gs2j952d31 - (CONFIRM) https://lists.apache.org/thread/g4l64s283njhnph2otx7q4gs2j952d31 - Mailing List, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2022/11/14/4 - (MLIST) http://www.openwall.com/lists/oss-security/2022/11/14/4 - Mailing List, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-502 CWE-287
First Time Apache
Apache soap

14 Nov 2022, 16:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/11/14/4 -

14 Nov 2022, 14:55

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-14 14:15

Updated : 2024-04-11 01:17


NVD link : CVE-2022-45378

Mitre link : CVE-2022-45378

CVE.ORG link : CVE-2022-45378


JSON object : View

Products Affected

apache

  • soap
CWE
CWE-306

Missing Authentication for Critical Function