Overview
- Description
- In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
- Source
- security@apache.org
- NVD status
- Modified
- CNA Tags
- unsupported-when-assigned
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:soap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0429414A-57AB-4A24-849A-A2999E860254", "versionEndIncluding": "2.3" } ], "operator": "OR" } ] } ]