Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.axis/axis
  4. ›
  5. CVE-2007-2353

CVE-2007-2353: Apache Axis allows Exposure of Sensitive Information to an Unauthorized Actor

May 1, 2022 (updated March 20, 2026)

Apache Axis 1.0 allows remote attackers to obtain sensitive information by requesting a non-existent WSDL file, which reveals the installation path in the resulting exception message.

References

  • exchange.xforce.ibmcloud.com/vulnerabilities/34167
  • github.com/advisories/GHSA-2c4w-2px5-9x3x
  • github.com/albfernandez/axis1-java/commit/32f35038ecae2c7a7f2e904b2289fd383f6f4d1f
  • github.com/albfernandez/axis1-java/issues/34
  • github.com/apache/axis-axis1-java
  • github.com/apache/axis-axis1-java/commit/2fdbb91c5e861e804db70cada188b1d7c1603513
  • github.com/apache/axis-axis1-java/commit/7ba89deb2eb21615630f18e96a35bfdec7f7cfed
  • nvd.nist.gov/vuln/detail/CVE-2007-2353

Code Behaviors & Features

Detect and mitigate CVE-2007-2353 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.2

Fixed versions

  • 1.2

Solution

Upgrade to version 1.2 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

maven/org.apache.axis/axis/CVE-2007-2353.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 21 Mar 2026 12:18:21 +0000.