Description
In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
http://www.openwall.com/lists/oss-security/2022/11/14/4
https://lists.apache.org/thread/g4l64s283njhnph2otx7q4gs2j952d31
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2022-11-14T14:15:10.200
2 years agoLast modified
2024-08-03T14:15:47.377
11 months ago