← Volver a CVEs
CVE-2019-0227
HIGH7.5
Descripcion
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueADJACENT_NETWORK
ComplejidadHIGH
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/1/2019
Ultima modificacion5/8/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
apache:axisoracle:agile_engineering_data_managementoracle:agile_product_lifecycle_managementoracle:application_testing_suiteoracle:big_data_discoveryoracle:communications_asap_cartridgesoracle:communications_design_studiooracle:communications_element_manageroracle:communications_network_integrityoracle:communications_order_and_service_managementoracle:communications_session_report_manageroracle:communications_session_route_manageroracle:endeca_information_discovery_studiooracle:enterprise_manager_base_platformoracle:enterprise_manager_for_fusion_middlewareoracle:financial_services_analytical_applications_infrastructureoracle:financial_services_compliance_regulatory_reportingoracle:financial_services_funds_transfer_pricingoracle:flexcube_core_bankingoracle:flexcube_private_bankingoracle:hospitality_guest_accessoracle:instantis_enterprisetrackoracle:internet_directoryoracle:knowledgeoracle:peoplesoft_enterprise_human_capital_management_human_resourcesoracle:peoplesoft_enterprise_peopletoolsoracle:policy_automation_connector_for_siebeloracle:primavera_gatewayoracle:primavera_unifieroracle:rapid_planningoracle:real-time_decision_serveroracle:retail_order_brokeroracle:retail_xstore_point_of_serviceoracle:secure_global_desktoporacle:siebel_ui_frameworkoracle:tuxedooracle:webcenter_portal
Debilidades (CWE)
CWE-918
Referencias
https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd%40%3Cjava-user.axis.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E(security@apache.org)
https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/(security@apache.org)
https://security.netapp.com/advisory/ntap-20240621-0006/(security@apache.org)
https://www.oracle.com/security-alerts/cpuApr2021.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuapr2020.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuapr2022.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujan2020.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujan2021.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujul2020.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujul2022.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuoct2021.html(security@apache.org)
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(security@apache.org)
https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd%40%3Cjava-user.axis.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20240621-0006/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuApr2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.