** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF
This issue affects Apache Axis: through 1.3.
As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 applied. The Apache Axis project does not expect to create an Axis 1.x release
fixing this problem, though contributors that would like to work towards
this are welcome.
References
| Link | Resource |
|---|---|
| https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 | Patch |
| https://lists.apache.org/thread/8nrm5thop8f82pglx4o0jg8wmvy6d9yd | Patch Third Party Advisory |
| https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 | Patch |
| https://lists.apache.org/thread/8nrm5thop8f82pglx4o0jg8wmvy6d9yd | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 08:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 - Patch | |
| References | () https://lists.apache.org/thread/8nrm5thop8f82pglx4o0jg8wmvy6d9yd - Patch, Third Party Advisory |
12 Jan 2024, 21:04
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-918 | |
| References | () https://lists.apache.org/thread/8nrm5thop8f82pglx4o0jg8wmvy6d9yd - Patch, Third Party Advisory | |
| References | () https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 - Patch | |
| CPE | cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| First Time |
Apache
Apache axis |
06 Jan 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-06 12:15
Updated : 2025-06-18 16:15
NVD link : CVE-2023-51441
Mitre link : CVE-2023-51441
CVE.ORG link : CVE-2023-51441
JSON object : View
Products Affected
apache
- axis
CWE
CWE-918
Server-Side Request Forgery (SSRF)
