{"vulnerability": "CVE-2022-34267", "sightings": [{"uuid": "2ad8efd7-5ea4-4baf-96fd-bf0bea95aad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34267", "type": "seen", "source": "https://t.me/ctinow/159168", "content": "https://ift.tt/2tAYmC8\nCVE-2022-34267", "creation_timestamp": "2023-12-25T09:31:14.000000Z"}, {"uuid": "f2b083aa-8a77-4d21-bfb7-fc185d050488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34267", "type": "seen", "source": "https://t.me/ctinow/170103", "content": "https://ift.tt/XTrsR9z\nCVE-2022-34267 | RWS WorldServer up to 11.7.2 JAR Archive api improper authentication", "creation_timestamp": "2024-01-19T09:16:23.000000Z"}, {"uuid": "19ff7c34-76b3-49c3-89f9-7491fa41c40c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34267", "type": "seen", "source": "https://t.me/ctinow/162826", "content": "https://ift.tt/WiouwsZ\nCVE-2022-34267 Exploit", "creation_timestamp": "2024-01-04T08:16:40.000000Z"}, {"uuid": "c8822dd2-8c6f-484a-ba38-176e8a6b8cac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34267", "type": "seen", "source": "https://t.me/arpsyndicate/2185", "content": "#ExploitObserverAlert\n\nCVE-2022-34267\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-34267. An issue was discovered in RWS WorldServer before 11.7.3. Adding a token parameter with the value of 02 bypasses all authentication requirements. Arbitrary Java code can be uploaded and executed via a .jar archive to the ws-api/v2/customizations/api endpoint.", "creation_timestamp": "2023-12-28T03:29:28.000000Z"}]}