PT-2023-6524 · Apache+3 · Apache Axis+3
Letian Yuan
·
Published
2023-09-05
·
Updated
2024-08-02
·
CVE-2023-40743
CVSS v2.0
10
Critical
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Apache Axis versions prior to 1.4
Description
The issue arises from insufficient input validation in the implementation of the Apache Axis web service platform, allowing potentially dangerous lookup mechanisms such as LDAP when looking up a service through
ServiceFactory.getService. Passing untrusted input to this API method could expose the application to Denial of Service (DoS), Server-Side Request Forgery (SSRF), and even attacks leading to Remote Code Execution (RCE).Recommendations
As a temporary workaround, consider reviewing your code to verify no untrusted or unsanitized input is passed to
ServiceFactory.getService.
Migrate to a different SOAP engine, such as Apache Axis 2/Java, to fully resolve the issue.
Apply the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 as an alternative workaround.Fix
RCE
DoS
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Apache Axis
Astra Linux
Linuxmint
Ubuntu