All the vulnerabilites related to Apache Software Foundation - Apache SOAP
cve-2022-45378
Vulnerability from cvelistv5
Published
2022-11-14 00:00
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
Apache SOAP allows unauthenticated users to potentially invoke arbitrary code
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache SOAP |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:apache:soap:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "soap", "vendor": "apache", "versions": [ { "lessThan": "2.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-45378", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-29T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-19T03:55:24.085Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:56.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/g4l64s283njhnph2otx7q4gs2j952d31" }, { "name": "[oss-security] 20221114 CVE-2022-45378: Apache SOAP allows unauthenticated users to potentially invoke arbitrary code", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/14/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache SOAP", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "Apache SOAP 2.3" }, { "lessThan": "2.3", "status": "unknown", "version": "Apache SOAP", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": " Apache would like to thank TsungShu Chiu (CHT Security) for reporting this issue" } ], "descriptions": [ { "lang": "en", "value": "In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." } ], "metrics": [ { "other": { "content": { "other": "moderate" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-27T12:55:38.995Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/g4l64s283njhnph2otx7q4gs2j952d31" }, { "name": "[oss-security] 20221114 CVE-2022-45378: Apache SOAP allows unauthenticated users to potentially invoke arbitrary code", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/14/4" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "unsupported-when-assigned" ], "title": "Apache SOAP allows unauthenticated users to potentially invoke arbitrary code", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-45378", "datePublished": "2022-11-14T00:00:00", "dateReserved": "2022-11-14T00:00:00", "dateUpdated": "2024-08-03T14:09:56.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40705
Vulnerability from cvelistv5
Published
2022-09-22 08:15
Modified
2024-08-03 12:21
Severity ?
EPSS score ?
Summary
Apache SOAP: XML External Entity Injection (XXE) allows unauthenticated users to read arbitrary files via HTTP
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread/02yo04w93rdjmllz4454lvodn5xzhwhl | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/09/22/1 | mailing-list, x_refsource_MLIST |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache SOAP |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:apache:soap:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "soap", "vendor": "apache", "versions": [ { "lessThan": "*", "status": "affected", "version": "2.2", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-40705", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T18:54:06.693786Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T19:18:33.304Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T12:21:46.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread/02yo04w93rdjmllz4454lvodn5xzhwhl" }, { "name": "[oss-security] 20220922 CVE-2022-40705: Apache SOAP: XML External Entity Injection (XXE) allows unauthenticated users to read arbitrary files via HTTP", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/22/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache SOAP", "vendor": "Apache Software Foundation", "versions": [ { "changes": [ { "at": "2.2", "status": "unknown" } ], "lessThan": "Apache SOAP*", "status": "affected", "version": "2.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Apache would like to thank TsungShu Chiu (CHT Security) for reporting this issue" } ], "descriptions": [ { "lang": "en", "value": "An Improper Restriction of XML External Entity Reference vulnerability in RPCRouterServlet of Apache SOAP allows an attacker to read arbitrary files over HTTP. This issue affects Apache SOAP version 2.2 and later versions. It is unknown whether previous versions are also affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer" } ], "metrics": [ { "other": { "content": { "other": "important" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611: Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-22T11:05:59", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread/02yo04w93rdjmllz4454lvodn5xzhwhl" }, { "name": "[oss-security] 20220922 CVE-2022-40705: Apache SOAP: XML External Entity Injection (XXE) allows unauthenticated users to read arbitrary files via HTTP", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/22/1" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "unsupported-when-assigned" ], "title": "Apache SOAP: XML External Entity Injection (XXE) allows unauthenticated users to read arbitrary files via HTTP", "workarounds": [ { "lang": "en", "value": "We do not expect to release a version that fixes this problem. Instead, we recommend users to migrate to one of the other actively maintained web service stacks such as Apache CXF (https://cxf.apache.org) or Apache Axis (https://axis.apache.org).\n\nApache SOAP is an archived project, with the last release published in 2003. This means it is no longer maintained, does not receive updates, and we do not commit to publishing CVE\u0027s for security problems in this project. This advisory is published purely as a courtesy." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-40705", "STATE": "PUBLIC", "TITLE": "Apache SOAP: XML External Entity Injection (XXE) allows unauthenticated users to read arbitrary files via HTTP" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache SOAP", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "Apache SOAP", "version_value": "2.2" }, { "version_affected": "?\u003c", "version_name": "Apache SOAP", "version_value": "2.2" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Apache would like to thank TsungShu Chiu (CHT Security) for reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** UNSUPPORTED WHEN ASSIGNED ** An Improper Restriction of XML External Entity Reference vulnerability in RPCRouterServlet of Apache SOAP allows an attacker to read arbitrary files over HTTP. This issue affects Apache SOAP version 2.2 and later versions. It is unknown whether previous versions are also affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "important" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-611: Improper Restriction of XML External Entity Reference" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread/02yo04w93rdjmllz4454lvodn5xzhwhl", "refsource": "MISC", "url": "https://lists.apache.org/thread/02yo04w93rdjmllz4454lvodn5xzhwhl" }, { "name": "[oss-security] 20220922 CVE-2022-40705: Apache SOAP: XML External Entity Injection (XXE) allows unauthenticated users to read arbitrary files via HTTP", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/09/22/1" } ] }, "source": { "discovery": "UNKNOWN" }, "work_around": [ { "lang": "en", "value": "We do not expect to release a version that fixes this problem. Instead, we recommend users to migrate to one of the other actively maintained web service stacks such as Apache CXF (https://cxf.apache.org) or Apache Axis (https://axis.apache.org).\n\nApache SOAP is an archived project, with the last release published in 2003. This means it is no longer maintained, does not receive updates, and we do not commit to publishing CVE\u0027s for security problems in this project. This advisory is published purely as a courtesy." } ] } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-40705", "datePublished": "2022-09-22T08:15:16", "dateReserved": "2022-09-14T00:00:00", "dateUpdated": "2024-08-03T12:21:46.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }