An issue was discovered in RWS WorldServer before 11.7.3. An authenticated, remote attacker can perform a ws-legacy/load_dtd?system_id= blind SSRF attack to deploy JSP code to the Apache Axis service running on the localhost interface, leading to command execution.
References
| Link | Resource |
|---|---|
| https://www.rws.com/localization/products/trados-enterprise/worldserver/ | Product |
| https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver | Exploit Third Party Advisory |
| https://www.rws.com/localization/products/trados-enterprise/worldserver/ | Product |
| https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver | Exploit Third Party Advisory |
Configurations
History
16 Apr 2025, 18:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.rws.com/localization/products/trados-enterprise/worldserver/ - Product | |
| References | () https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver - Exploit, Third Party Advisory | |
| First Time |
Rws worldserver
Rws |
|
| CPE | cpe:2.3:a:rws:worldserver:*:*:*:*:*:*:*:* |
Information
Published : 2024-02-29 01:35
Updated : 2025-04-16 18:21
NVD link : CVE-2022-34269
Mitre link : CVE-2022-34269
CVE.ORG link : CVE-2022-34269
JSON object : View
Products Affected
rws
- worldserver
CWE
CWE-918
Server-Side Request Forgery (SSRF)
