CVE-2019-0227

NameCVE-2019-0227
DescriptionA Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs929266

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
axis (PTS)bullseye1.4-28+deb11u1vulnerable
bookworm1.4-28+deb12u1vulnerable
sid, trixie1.4-29vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
axissource(unstable)(unfixed)unimportant929266

Notes

https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/
https://github.com/apache/axis1-java/commit/7043f1ab0397d1ae35f879f2bcc99be1e9b55644
StockQuoteService.jws not present in Debian binary packages
disclosure mentions "03/12/2019 - Apache applied SSRF patch":
https://github.com/RhinoSecurityLabs/CVEs/issues/1
https://github.com/apache/axis1-java/commit/35511b872a6460129cfc0cd35baaccbd820977b5

Search for package or bug name: Reporting problems