CVE-2023-51441
Severity CVSS v4.0:
Pending analysis
Type:
CWE-918
Server-Side Request Forgery (SSRF)
Publication date:
06/01/2024
Last modified:
18/06/2025
Description
** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF<br />
This issue affects Apache Axis: through 1.3.<br />
<br />
As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 applied. The Apache Axis project does not expect to create an Axis 1.x release <br />
fixing this problem, though contributors that would like to work towards<br />
this are welcome.<br />
<br />
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:* | 1.3 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06
- https://lists.apache.org/thread/8nrm5thop8f82pglx4o0jg8wmvy6d9yd
- https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06
- https://lists.apache.org/thread/8nrm5thop8f82pglx4o0jg8wmvy6d9yd



