Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-40743: Filter out unsupported protocols in the client class ServiceFactory · apache/axis-axis1-java@7e66753

** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through “ServiceFactory.getService” allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.

As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

CVE
#apache#git#java#rce#ldap#ssrf

Expand Up

@@ -106,6 +106,10 @@ public static Service getService(Map environment)

if (context != null) {

String name = (String)environment.get(“jndiName”);

if(name!=null && (name.toUpperCase().indexOf(“LDAP”)!=-1 || name.toUpperCase().indexOf(“RMI”)!=-1 || name.toUpperCase().indexOf(“JMS”)!=-1 || name.toUpperCase().indexOf(“JMX”)!=-1) || name.toUpperCase().indexOf(“JRMP”)!=-1 || name.toUpperCase().indexOf(“JAVA”)!=-1 || name.toUpperCase().indexOf(“DNS”)!=-1) {

return null;

}

if (name == null) {

name = "axisServiceName";

}

Expand All

@@ -120,6 +124,7 @@ public static Service getService(Map environment)

context.bind(name, service);

} catch (NamingException e1) {

// !!! Couldn’t do it, what should we do here?

return null;

}

}

} else {

Expand Down

Related news

Ubuntu Security Notice USN-6470-1

Ubuntu Security Notice 6470-1 - It was discovered that Axis incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907