CVE-2019-0227

NameCVE-2019-0227
DescriptionA Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs929266

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
axis (PTS)jessie1.4-22vulnerable
stretch1.4-25vulnerable
bullseye, sid, buster1.4-28vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
axissource(unstable)(unfixed)unimportant929266

Notes

https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/
https://github.com/apache/axis1-java/commit/7043f1ab0397d1ae35f879f2bcc99be1e9b55644
StockQuoteService.jws not present in Debian binary packages
disclosure mentions "03/12/2019 - Apache applied SSRF patch":
https://github.com/RhinoSecurityLabs/CVEs/issues/1
https://github.com/apache/axis1-java/commit/35511b872a6460129cfc0cd35baaccbd820977b5

Search for package or bug name: Reporting problems