Executive Summary

Informations
Name CVE-2023-40743 First vendor Publication 2023-09-05
Vendor Cve Last vendor Modification 2025-02-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 9.8
Base Score 9.8 Environmental Score 9.8
impact SubScore 5.9 Temporal Score 9.8
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.

As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40743

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 26

Sources (Detail)

https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e44...
https://lists.apache.org/thread/gs0qgk2mgss7zfhzdd6ftfjvm4kp7v82
https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2025-02-13 21:21:39
  • Multiple Updates
2024-11-28 14:28:42
  • Multiple Updates
2024-08-03 00:27:44
  • Multiple Updates
2024-08-01 17:27:43
  • Multiple Updates
2024-07-18 21:27:50
  • Multiple Updates
2024-05-17 09:27:53
  • Multiple Updates
2024-05-15 17:27:54
  • Multiple Updates
2024-04-11 09:27:54
  • Multiple Updates
2024-03-21 09:27:57
  • Multiple Updates
2023-11-07 21:28:02
  • Multiple Updates
2023-10-17 21:27:38
  • Multiple Updates
2023-09-11 21:27:46
  • Multiple Updates
2023-09-05 21:27:19
  • First insertion