Loading HuntDB...

GHSA-hr2c-p8rh-238h

GitHub Security Advisory

Apache Axis Improper Input Validation vulnerability

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF.
This issue affects Apache Axis through 1.3.

As Axis 1 has been EOL, we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 applied. The Apache Axis project does not expect to create an Axis 1.x release
fixing this problem, though contributors that would like to work towards this are welcome.

Affected Packages

Maven org.apache.axis:axis
Affected versions: 0 (last affected: 1.3)
Maven axis:axis
Affected versions: 0 (last affected: 1.3)

Related CVEs

Key Information

GHSA ID
GHSA-hr2c-p8rh-238h
Published
January 6, 2024 12:30 PM
Last Modified
March 14, 2024 9:57 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.apache.axis:axis
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 27, 2025 6:35 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.