Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-hr2c-p8rh-238h: Apache Axis Improper Input Validation vulnerability

** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF. This issue affects Apache Axis through 1.3.

As Axis 1 has been EOL, we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 applied. The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

ghsa
#vulnerability#apache#git#java#ssrf#maven

Package

maven org.apache.axis:axis (Maven)

Affected versions

<= 1.3

Patched versions

None

Description

** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF.
This issue affects Apache Axis through 1.3.

As Axis 1 has been EOL, we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from apache/axis-axis1-java@685c309 applied. The Apache Axis project does not expect to create an Axis 1.x release
fixing this problem, though contributors that would like to work towards this are welcome.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2023-51441
  • apache/axis-axis1-java@685c309
  • https://lists.apache.org/thread/8nrm5thop8f82pglx4o0jg8wmvy6d9yd

Published by the National Vulnerability Database

Jan 6, 2024

Published to the GitHub Advisory Database

Jan 6, 2024

Reviewed

Jan 8, 2024

Last updated

Jan 8, 2024

ghsa: Latest News

GHSA-pxg6-pf52-xh8x: cookie accepts cookie name, path, and domain with out of bounds characters