Remote Code Execution (RCE) The advisory has been revoked - it doesn't affect any version of package org.apache.axis2:axis2-transport-http  (opens in a new tab)


Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Remote Code Execution (RCE) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEAXIS2-568585
  • published7 May 2020
  • disclosed7 May 2020
  • creditUnknown

Introduced: 7 May 2020

CVE NOT AVAILABLE CWE-94  (opens in a new tab)

How to fix?

Upgrade org.apache.axis2:axis2-transport-http to version 1.7.0 or higher.

Amendment

This was deemed not a vulnerability.

Overview

org.apache.axis2:axis2-transport-http is a Web Services / SOAP / WSDL engine

Affected versions of this package are vulnerable to Remote Code Execution (RCE). If a malicious server begins its reply with more than 512 bytes without CRLF (ie. in place of the response status), this causes a stack overflow in the client.