Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-0227

Опубликовано: 09 апр. 2019
Источник: redhat
CVSS3: 8

Описание

A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5axisWill not fix
Red Hat Enterprise Linux 6axisWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-547
https://bugzilla.redhat.com/show_bug.cgi?id=1698764axis: Hard coded domain name in example web service named “StockQuoteService.jws” leading to remote code execution.

8 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.

CVSS3: 7.5
nvd
почти 7 лет назад

A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.

CVSS3: 7.5
debian
почти 7 лет назад

A Server Side Request Forgery (SSRF) vulnerability affected the Apache ...

CVSS3: 7.5
github
больше 6 лет назад

Server Side Request Forgery in Apache Axis

CVSS3: 7.5
fstec
около 7 лет назад

Уязвимость платформы веб-сервисов Apache Axis, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю осуществить SSRF-атаку

8 High

CVSS3