[
https://issues.apache.org/jira/browse/AXIS2-5846?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15980384#comment-15980384
]
Hudson commented on AXIS2-5846:
-------------------------------
UNSTABLE: Integrated in Jenkins build Axis2 #3688 (See
[https://builds.apache.org/job/Axis2/3688/])
AXIS2-5846: Fix a local file inclusion vulnerability in SimpleHTTPServer. This
occurs because axis2server.sh adds the root directory of the binary
distribution to the class path, and SimpleHTTPServer doesn't limit the search
for XSD/WSDL files to the service class loader. This means that axis2.xml is
accessible remotely via a specially crafted query string
(xsd=../conf/axis2.xml).
Although AxisServlet is not known to be vulnerable, this change also modifies
ListingAgent to limit the search to the service class loader. (veithen: rev
1792353)
* (edit)
axis2/modules/transport/http/src/org/apache/axis2/transport/http/HTTPTransportUtils.java
* (edit)
axis2/modules/transport/http/src/org/apache/axis2/transport/http/HTTPWorker.java
* (edit)
axis2/modules/transport/http/src/org/apache/axis2/transport/http/ListingAgent.java
> Local file inclusion vulnerability in SimpleHTTPServer
> ------------------------------------------------------
>
> Key: AXIS2-5846
> URL: https://issues.apache.org/jira/browse/AXIS2-5846
> Project: Axis2
> Issue Type: Bug
> Affects Versions: 1.6.2, 1.7.4
> Reporter: Nupur
>
> Defect CSCvd86595: Local file inclusion vulnerability in Axis2
> An defect has been raised on Present PCP 7.3 axis version
> *There is a Local File Inclusion (LFI) present in the Axis2 service. It
> allows the attacker to view certain files that would normally be
> inaccessible. This is a violation of PSB requirement SEC-SUP-PATCH because
> this is a publicly disclosed vulnerability with a patch.
> *security impact: Some of the files that are accessible via this LFI contain
> the username and password to the Axis2 admin interface. While the admin
> interface appears to be disabled currently, if it was ever enabled or an
> attacker found a way to access it, they would gain admin access to the Axis2
> system.
> In addition, this vulnerability is publicly known, which makes it more likely
> to be exploited by an attacker.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]