← Voltar para CVEs
CVE-2019-0227
HIGH7.5
Descricao
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
Detalhes CVE
Pontuacao CVSS v3.17.5
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueADJACENT_NETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado5/1/2019
Ultima modificacao5/8/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
apache:axisoracle:agile_engineering_data_managementoracle:agile_product_lifecycle_managementoracle:application_testing_suiteoracle:big_data_discoveryoracle:communications_asap_cartridgesoracle:communications_design_studiooracle:communications_element_manageroracle:communications_network_integrityoracle:communications_order_and_service_managementoracle:communications_session_report_manageroracle:communications_session_route_manageroracle:endeca_information_discovery_studiooracle:enterprise_manager_base_platformoracle:enterprise_manager_for_fusion_middlewareoracle:financial_services_analytical_applications_infrastructureoracle:financial_services_compliance_regulatory_reportingoracle:financial_services_funds_transfer_pricingoracle:flexcube_core_bankingoracle:flexcube_private_bankingoracle:hospitality_guest_accessoracle:instantis_enterprisetrackoracle:internet_directoryoracle:knowledgeoracle:peoplesoft_enterprise_human_capital_management_human_resourcesoracle:peoplesoft_enterprise_peopletoolsoracle:policy_automation_connector_for_siebeloracle:primavera_gatewayoracle:primavera_unifieroracle:rapid_planningoracle:real-time_decision_serveroracle:retail_order_brokeroracle:retail_xstore_point_of_serviceoracle:secure_global_desktoporacle:siebel_ui_frameworkoracle:tuxedooracle:webcenter_portal
Fraquezas (CWE)
CWE-918
Referencias
https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd%40%3Cjava-user.axis.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E(security@apache.org)
https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/(security@apache.org)
https://security.netapp.com/advisory/ntap-20240621-0006/(security@apache.org)
https://www.oracle.com/security-alerts/cpuApr2021.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuapr2020.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuapr2022.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujan2020.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujan2021.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujul2020.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujul2022.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuoct2021.html(security@apache.org)
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(security@apache.org)
https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd%40%3Cjava-user.axis.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20240621-0006/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuApr2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.