Your message dated Sun, 05 Nov 2023 17:47:08 +0000
with message-id <e1qzhdi-007pla...@fasolo.debian.org>
and subject line Bug#1051288: fixed in axis 1.4-28+deb12u1
has caused the Debian Bug report #1051288,
regarding axis: CVE-2023-40743
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051288: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051288
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: axis
Version: 1.4-28
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for axis.

CVE-2023-40743[0]:
| ** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in
| an application, it may not have been obvious that looking up a
| service through "ServiceFactory.getService" allows potentially
| dangerous lookup mechanisms such as LDAP. When passing untrusted
| input to this API method, this could expose the application to DoS,
| SSRF and even attacks leading to RCE.  As Axis 1 has been EOL we
| recommend you migrate to a different SOAP engine, such as Apache
| Axis 2/Java. As a workaround, you may review your code to verify no
| untrusted or unsanitized input is passed to
| "ServiceFactory.getService", or by applying the patch from
| https://github.com/apache/axis-
| axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The
| Apache Axis project does not expect to create an Axis 1.x release
| fixing this problem, though contributors that would like to work
| towards this are welcome.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-40743
    https://www.cve.org/CVERecord?id=CVE-2023-40743
[1] https://www.openwall.com/lists/oss-security/2023/09/05/1
[2] 
https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: axis
Source-Version: 1.4-28+deb12u1
Done: Markus Koschany <a...@debian.org>

We believe that the bug you reported is fixed in the latest version of
axis, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany <a...@debian.org> (supplier of updated axis package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 17 Oct 2023 14:05:20 +0200
Source: axis
Architecture: source
Version: 1.4-28+deb12u1
Distribution: bookworm
Urgency: medium
Maintainer: Debian Java Maintainers 
<pkg-java-maintain...@lists.alioth.debian.org>
Changed-By: Markus Koschany <a...@debian.org>
Closes: 1051288
Changes:
 axis (1.4-28+deb12u1) bookworm; urgency=medium
 .
   * Team upload.
   * Fix CVE-2023-40743:
     When integrating Apache Axis 1.x in an application, it may not have been
     obvious that looking up a service through "ServiceFactory.getService"
     allows potentially dangerous lookup mechanisms such as LDAP. When passing
     untrusted input to this API method, this could expose the application to
     DoS, SSRF and even attacks leading to RCE. (Closes: #1051288)
Checksums-Sha1:
 530e10161cae94d3d4d911d6a7c2a545293637d5 2375 axis_1.4-28+deb12u1.dsc
 6e688ab77c6e15bc4c9be0003ba3be600193e25c 14232 
axis_1.4-28+deb12u1.debian.tar.xz
 2db6781aea7c76dfdf2b303054cb476ffb61fc07 11044 
axis_1.4-28+deb12u1_amd64.buildinfo
Checksums-Sha256:
 8c0404c7deb6b0a3dc09d54594be66daec5734687a5bd4cbc1f0b18e7c43b5a2 2375 
axis_1.4-28+deb12u1.dsc
 588df7082e0b6ae1750597010075d84666be27a4641c21793da599c90212ff6b 14232 
axis_1.4-28+deb12u1.debian.tar.xz
 e825dfe825871d360d161e56e19a8e100540f1ba2d2cf4b0bf8a1c63ccb8e42f 11044 
axis_1.4-28+deb12u1_amd64.buildinfo
Files:
 75f5cf773c59fdb3733a0b94d440a5d6 2375 java optional axis_1.4-28+deb12u1.dsc
 558afb92dc173d31884d4793be287c0e 14232 java optional 
axis_1.4-28+deb12u1.debian.tar.xz
 1fc0088c995d6a3f40e6b5269c67e263 11044 java optional 
axis_1.4-28+deb12u1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=dy+a
-----END PGP SIGNATURE-----

--- End Message ---
__
This is the maintainer address of Debian's Java team
<https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-java-maintainers>.
 Please use
debian-j...@lists.debian.org for discussions and questions.

Reply via email to