soap:soap@2.2 vulnerabilities

  • latest version

    2.3.1

  • first published

    19 years ago

  • latest version published

    19 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the soap:soap package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Code Execution

    Affected versions of this package are vulnerable to Arbitrary Code Execution via RPCRouterServlet, which can invoke arbitrary methods on the classpath. If those methods enable code execution this can in turn allow an attacker to execute code.

    NOTE: Apache recommends for affected users to migrate to one of the other actively maintained web service stacks such as Apache CXF (https://cxf.apache.org) or Apache Axis (https://axis.apache.org).

    How to fix Arbitrary Code Execution?

    There is no fixed version for soap:soap.

    [0,)
    • H
    XML External Entity (XXE) Injection

    Affected versions of this package are vulnerable to XML External Entity (XXE) Injection through RPCRouterServlet, which allows the reading of arbitrary files over HTTP.

    Note: Apache recommends for affected users to migrate to one of the other actively maintained web service stacks such as Apache CXF (https://cxf.apache.org) or Apache Axis (https://axis.apache.org).

    How to fix XML External Entity (XXE) Injection?

    There is no fixed version for soap:soap.

    [2.2,)