First published: Mon Nov 14 2022(Updated: )
** UNSUPPPORTED WHEN ASSIGNED ** In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache SOAP | <=2.3 | |
<=2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45378 is considered to be a high severity vulnerability due to its potential for unauthenticated remote method invocation.
To fix CVE-2022-45378, it is recommended to restrict access to the RPCRouterServlet by implementing proper authentication mechanisms.
CVE-2022-45378 affects all versions of Apache SOAP up to and including 2.3.
CVE-2022-45378 can allow attackers to invoke methods on the classpath without authentication, potentially leading to unauthorized data access or manipulation.
A temporary workaround for CVE-2022-45378 is to disable the RPCRouterServlet if it's not in use, until a proper fix can be applied.