UNSUPPORTED WHEN ASSIGNED Improper Input Validation vulnerability in
Apache Axis allowed users with access to the admin service to perform
possible SSRF This issue affects Apache Axis: through 1.3. As Axis 1 has
been EOL we recommend you migrate to a different SOAP engine, such as
Apache Axis 2/Java. Alternatively you could use a build of Axis with the
patch from
https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06
applied. The Apache Axis project does not expect to create an Axis 1.x
release fixing this problem, though contributors that would like to work
towards this are welcome.
github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06
launchpad.net/bugs/cve/CVE-2023-51441
lists.apache.org/thread/8nrm5thop8f82pglx4o0jg8wmvy6d9yd
nvd.nist.gov/vuln/detail/CVE-2023-51441
security-tracker.debian.org/tracker/CVE-2023-51441
www.cve.org/CVERecord?id=CVE-2023-51441
www.openwall.com/lists/oss-security/2024/01/05/2