CVE-2023-51441

CVSS 3.1 Score 7.2 of 10 (high)

Details

Published Jan 6, 2024
Updated: Aug 2, 2024
CWE ID 918

Summary

CVE-2023-51441 introduces an Improper Input Validation vulnerability in Apache Axis, allowing users with admin service access to potentially execute Server Side Request Forgery (SSRF) attacks. Affected versions include all releases up to 1.3. Due to the End of Life (EOL) status of Axis 1, the Apache Axis project does not plan to release a fix. Instead, it is recommended to migrate to a new SOAP engine, such as Apache Axis 2/Java, or apply the patch from <https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06>. Contributors are welcome to work on a potential fix for Axis 1.x.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • Apache Axis

Affected Vendors

  • Apache Software Foundation

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-51441 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions