
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-45378 is a security vulnerability discovered in Apache SOAP affecting its default configuration. The vulnerability was disclosed on November 14, 2022, and impacts all versions of Apache SOAP up to version 2.3. The issue stems from an RPCRouterServlet being accessible without authentication, potentially allowing unauthorized access to critical system functions (NVD, OSS Security).
The vulnerability is characterized by a missing authentication mechanism for critical functions (CWE-306). The CVSS v3.1 base score is 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The technical issue involves an RPCRouterServlet that is accessible without authentication in the default configuration, allowing potential attackers to invoke methods on the classpath that meet certain criteria (NVD).
The vulnerability's impact is severe as it could potentially lead to arbitrary remote code execution, depending on what classes are available on the classpath. The high CVSS score reflects the critical nature of this vulnerability, with potential impacts on system confidentiality, integrity, and availability (NVD).
No official patches are available as this vulnerability affects products that are no longer supported by the maintainer. The recommended mitigation is to upgrade to supported versions of the software or implement alternative solutions (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."