Risk | High |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-45378 |
CWE-ID | CWE-749 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Apache SOAP Server applications / Other server solutions |
Vendor | Apache Foundation |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU69289
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-45378
CWE-ID:
CWE-749 - Exposed Dangerous Method or Function
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing authentication when accessing the RPCRouterServlet servlet. A remote attacker can invoke certain methods on the classpath and execute arbitrary code on the system.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Note, the project is no longer maintained.
Vulnerable software versionsApache SOAP: 1.2 - 2.3.1
CPE2.3https://seclists.org/oss-sec/2022/q4/142
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.