CVE-2022-34267 Scanner

CVE-2022-34267 Scanner - Authorization Bypass vulnerability in RWS WorldServer

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

11 days 4 hours

Scan only one

Domain, IPv4

Toolbox

-

RWS WorldServer is a localization management solution widely used for global content management by various enterprises. It facilitates efficient translation and localization workflows, making it indispensable in industries focused on global reach. Organizations leverage its capabilities to manage multi-language content. The product streamlines the process of translating documents, marketing materials, and software interfaces. Companies like RWS provide various customization options within WorldServer to adapt to specific needs. Its robust architecture and integration options make it a critical component of localization strategies.

The vulnerability in question, an Authorization Bypass, impacts RWS WorldServer versions before 7.3. This security flaw allows an attacker to bypass authentication by manipulating tokens. The critical nature of this flaw is underscored by its potential to execute arbitrary Java code on the server. Exploiting this weakness could lead to unauthorized access and control over the system. Given the high CVSS score, this vulnerability presents significant risks to affected installations. It is crucial for users to address this flaw immediately to maintain system integrity and security.

The technical details reveal that adding a token parameter with '02' allows an unauthenticated user to achieve authentication bypass in the system. Specifically, the vulnerable endpoint is "/ws-api/v2/customizations/api", which can be exploited using a crafted .jar archive. Attackers can upload malicious Java code directly, leading to potentially severe outcomes. The mechanism by which authorization is bypassed poses a critical risk requiring prompt remedial action. An exposed endpoint treats specific token values as indicators of valid authentication, thus neglecting proper security validation.

If exploited, the effects of this vulnerability could be severe and far-reaching. Potential outcomes include unauthorized code execution, leading to data breaches and potentially significant financial and reputational damage. Attackers could use this unauthorized access to manipulate sensitive content or disrupt localization operations. Additionally, the successful execution of arbitrary Java code might compromise the entire system, giving attackers leverage over critical enterprise content. Furthermore, exploitation could lead to wider network access, affecting other systems within the organization.

REFERENCES

Get started to protecting your Free Full Security Scan