Логотип exploitDog
bind:CVE-2023-40743
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-40743

Количество 5

Количество 5

ubuntu логотип

CVE-2023-40743

больше 2 лет назад

** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2023-40743

больше 2 лет назад

** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-40743

больше 2 лет назад

** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-rmqp-9w4c-gc7w

больше 2 лет назад

Apache Axis 1.x (EOL) may allow RCE when untrusted input is passed to getService

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-07271

больше 2 лет назад

Уязвимость реализации прикладного программного интерфейса платформы веб-сервисов Apache Axis, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-40743

** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

CVSS3: 9.8
1%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-40743

** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

CVSS3: 9.8
1%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-40743

** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an ...

CVSS3: 9.8
1%
Низкий
больше 2 лет назад
github логотип
GHSA-rmqp-9w4c-gc7w

Apache Axis 1.x (EOL) may allow RCE when untrusted input is passed to getService

CVSS3: 9.8
1%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-07271

Уязвимость реализации прикладного программного интерфейса платформы веб-сервисов Apache Axis, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу