GHSA-789v-h9hw-38pg

Suggest an improvement
Source
https://github.com/advisories/GHSA-789v-h9hw-38pg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-789v-h9hw-38pg/GHSA-789v-h9hw-38pg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-789v-h9hw-38pg
Aliases
  • CVE-2022-45378
Published
2022-11-14T19:00:19Z
Modified
2024-02-16T08:14:04.795908Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Apache SOAP contains unauthenticated RPCRouterServlet
Details

* UNSUPPORTED WHEN ASSIGNED * In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Database specific
{
    "nvd_published_at": "2022-11-14T14:15:00Z",
    "cwe_ids": [
        "CWE-287",
        "CWE-306",
        "CWE-502"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2022-11-18T16:11:22Z"
}
References

Affected packages

Maven / soap:soap

Package

Name
soap:soap
View open source insights on deps.dev
Purl
pkg:maven/soap/soap

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.0.0

Affected versions

2.*

2.1
2.2
2.3
2.3.1