Vulnerability Details : CVE-2023-40743
** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.
As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
Vulnerability category: Server-side request forgery (SSRF) Denial of service
Products affected by CVE-2023-40743
- cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-40743
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-40743
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-08-01 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-40743
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security@apache.org (Primary)
-
The product does not adequately filter user-controlled input for special elements with control implications.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-40743
-
https://lists.apache.org/thread/gs0qgk2mgss7zfhzdd6ftfjvm4kp7v82
CVE-2023-40743: Apache Axis 1.x (EOL) may allow RCE when untrusted input is passed to getService-Apache Mail ArchivesIssue Tracking;Patch;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html
[SECURITY] [DLA 3622-1] axis security update
-
https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
Filter out unsupported protocols in the client class ServiceFactory · apache/axis-axis1-java@7e66753 · GitHubPatch
Jump to