Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1ybXFwLTl3NGMtZ2M3d84AA1sf

Apache Axis 1.x (EOL) may allow RCE when untrusted input is passed to getService

When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.

As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

Permalink: https://github.com/advisories/GHSA-rmqp-9w4c-gc7w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ybXFwLTl3NGMtZ2M3d84AA1sf
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 8 months ago
Updated: about 2 months ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-rmqp-9w4c-gc7w, CVE-2023-40743
References: Repository: https://github.com/apache/axis-axis1-java
Blast Radius: 33.3

Affected Packages

maven:axis:axis
Dependent packages: 133
Dependent repositories: 1,117
Downloads:
Affected Version Ranges: <= 1.4
No known fixed version
All affected versions: 1.2.1
maven:org.apache.axis:axis
Dependent packages: 129
Dependent repositories: 2,473
Downloads:
Affected Version Ranges: <= 1.4
No known fixed version
All affected versions: