CVE-2010-1632
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
22/06/2010
Last modified:
11/04/2025
Description
Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:axis2:*:*:*:*:*:*:*:* | 1.5.1 (including) | |
cpe:2.3:a:apache:axis2:1.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html
- http://geronimo.apache.org/21x-security-report.html
- http://geronimo.apache.org/22x-security-report.html
- http://markmail.org/message/e4yiij7lfexastvl
- http://secunia.com/advisories/40252
- http://secunia.com/advisories/40279
- http://secunia.com/advisories/41016
- http://secunia.com/advisories/41025
- http://www-01.ibm.com/support/docview.wss?uid=swg21433581
- http://www-1.ibm.com/support/docview.wss?uid=swg1PM14765
- http://www-1.ibm.com/support/docview.wss?uid=swg1PM14844
- http://www-1.ibm.com/support/docview.wss?uid=swg1PM14847
- http://www.securitytracker.com/id/1036901
- http://www.vupen.com/english/advisories/2010/1528
- http://www.vupen.com/english/advisories/2010/1531
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289984
- https://issues.apache.org/jira/browse/AXIS2-4450
- https://issues.apache.org/jira/browse/GERONIMO-5383
- https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf
- http://geronimo.apache.org/2010/07/21/apache-geronimo-v216-released.html
- http://geronimo.apache.org/21x-security-report.html
- http://geronimo.apache.org/22x-security-report.html
- http://markmail.org/message/e4yiij7lfexastvl
- http://secunia.com/advisories/40252
- http://secunia.com/advisories/40279
- http://secunia.com/advisories/41016
- http://secunia.com/advisories/41025
- http://www-01.ibm.com/support/docview.wss?uid=swg21433581
- http://www-1.ibm.com/support/docview.wss?uid=swg1PM14765
- http://www-1.ibm.com/support/docview.wss?uid=swg1PM14844
- http://www-1.ibm.com/support/docview.wss?uid=swg1PM14847
- http://www.securitytracker.com/id/1036901
- http://www.vupen.com/english/advisories/2010/1528
- http://www.vupen.com/english/advisories/2010/1531
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289984
- https://issues.apache.org/jira/browse/AXIS2-4450
- https://issues.apache.org/jira/browse/GERONIMO-5383
- https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf