CVE-2010-1632
Summary
| CVE | CVE-2010-1632 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-06-22 20:30:00 UTC |
| Updated | 2017-07-30 01:29:00 UTC |
| Description | Apache Axis2 before 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 through 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to the Synapse SimpleStockQuoteService. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Axis2 | 1.3 | All | All | All |
| Application | Apache | Axis2 | 1.4 | All | All | All |
| Application | Apache | Axis2 | 1.4.1 | All | All | All |
| Application | Apache | Axis2 | 1.5 | All | All | All |
| Application | Apache | Axis2 | 1.3 | All | All | All |
| Application | Apache | Axis2 | 1.4 | All | All | All |
| Application | Apache | Axis2 | 1.4.1 | All | All | All |
| Application | Apache | Axis2 | 1.5 | All | All | All |
| Application | Apache | Axis2 | All | All | All | All |
| Application | Apache | Geronimo | All | All | All | All |
| Application | Apache | Geronimo | All | All | All | All |
| Application | Apache | Orchestration Director Engine | All | All | All | All |
| Application | Apache | Orchestration Director Engine | All | All | All | All |
| Application | Apache | Synapse | All | All | All | All |
| Application | Apache | Synapse | All | All | All | All |
| Application | Apache | Tuscany | All | All | All | All |
| Application | Apache | Tuscany | All | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.1 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.10 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.11 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.12 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.2 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.3 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.4 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.5 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.6 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.7 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.8 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.9 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.1 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.10 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.11 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.12 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.2 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.3 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.4 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.5 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.6 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.7 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.8 | All | All | All |
| Application | Ibm | Websphere Application Server | 7.0.0.9 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IBM notice: The page you requested cannot be displayed | AIXAPAR | www-1.ibm.com | |
| Apache Geronimo : 2.2.x Security Report | CONFIRM | geronimo.apache.org | |
| Webmail - OVH | VUPEN | www.vupen.com | Vendor Advisory |
| IBM Potential security exposure with IBM WebSphere Application Server with JAX-WS or JAX-RS (PM14844, PM14847, PM14765) - United States | CONFIRM | www-01.ibm.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| Apache Geronimo : Apache Geronimo v2.1.6 - Released | CONFIRM | geronimo.apache.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Vendor Advisory |
| IBM notice: The page you requested cannot be displayed | AIXAPAR | www-1.ibm.com | |
| Apache Geronimo Multiple Vulnerabilities - Secunia.com | SECUNIA | secunia.com | |
| IBM notice: The page you requested cannot be displayed | AIXAPAR | www-1.ibm.com | |
| [AXIS2-4450] CVE-2010-1632: Message builders for SOAP and XML should not attempt to load DTDs - ASF JIRA | CONFIRM | issues.apache.org | |
| Apache Geronimo : 2.1.x Security Report | CONFIRM | geronimo.apache.org | |
| Re: Problem calling Web Service -> HTTP 503 error - Andreas Veithen - org.apache.ws.axis-user - MarkMail | MISC | markmail.org | |
| [GERONIMO-5383] CVE-2010-1632 and CVE-2010-2076: Axis2 and CXF HTTP binding enables DTD based XML attacks. - ASF JIRA | CONFIRM | issues.apache.org | |
| Apache Axis2/Java XML Document Type Declaration Processing Vulnerability - Advisories - Community | SECUNIA | secunia.com | Vendor Advisory |
| IBM WebSphere Application Server Web Services Vulnerability - Advisories - Community | SECUNIA | secunia.com | Vendor Advisory |
| svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf | CONFIRM | svn.apache.org | |
| Apache Geronimo Multiple Vulnerabilities - Advisories - Community | SECUNIA | secunia.com | |
| HPE Intelligent Management Center (iMC) PLAT Lets Remote Users View Files and Deny Service - SecurityTracker | SECTRACK | www.securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.