Server-side Request Forgery (SSRF) Affecting axis:axis package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-AXIS-6145990
  • published7 Jan 2024
  • disclosed6 Jan 2024
  • creditthiscodecc

Introduced: 6 Jan 2024

CVE-2023-51441  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

There is no fixed version for axis:axis.

Overview

axis:axis is an implementation of the SOAP ("Simple Object Access Protocol") submission to W3C.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the service admin HTTP API, due to improper user input sanitization in the getService function of the ServiceFactory class. Exploiting this vulnerability allows an attacker to cause the server to make arbitrary requests to unintended locations by sending crafted input to the vulnerable admin service.

Note As Axis 1 has been EOL, it is recommended to migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively, you could use a build of Axis with the patch from the [fix commit](https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 applied).

The Apache Axis project does not expect to create an Axis 1.x release

CVSS Scores

version 3.1