CVE-2022-34269

An issue was discovered in RWS WorldServer before 11.7.3. An authenticated, remote attacker can perform a ws-legacy/load_dtd?system_id= blind SSRF attack to deploy JSP code to the Apache Axis service running on the localhost interface, leading to command execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rws:worldserver:*:*:*:*:*:*:*:*

History

16 Apr 2025, 18:21

Type Values Removed Values Added
First Time Rws worldserver
Rws
CPE cpe:2.3:a:rws:worldserver:*:*:*:*:*:*:*:*
References () https://www.rws.com/localization/products/trados-enterprise/worldserver/ - () https://www.rws.com/localization/products/trados-enterprise/worldserver/ - Product
References () https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver - () https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver - Exploit, Third Party Advisory

Information

Published : 2024-02-29 01:35

Updated : 2025-04-16 18:21


NVD link : CVE-2022-34269

Mitre link : CVE-2022-34269

CVE.ORG link : CVE-2022-34269


JSON object : View

Products Affected

rws

  • worldserver
CWE
CWE-918

Server-Side Request Forgery (SSRF)