Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command execution vulnerability, which allows attackers to obtain privileges of the target server and remotely execute commands without authorization by sending a crafted HTTP-POST request.
Apache Axis is an open-source XML-based web service framework. It consists of a Java and a C++ implementation of the SOAP server, and various utilities and APIs for generating and deploying web service applications. Using Apache Axis, developers can create interoperable and distributed computing applications.
Scope of Impact
- Apache Axis <= 1.4
3.1 Manual Check
Axis users can locate the server-config.wsdd file in the website directory and then open it with a text editor. If the value of enableRemoteAdmin is true, it indicates that this vulnerability exists.
Protection with Security Products
4.1.1 Customer-Side Product Protection
To defend against this vulnerability, NSFOCUS has released rule update packages for its security products. Users are strongly recommended to update rule bases to the latest version to ensure that these security products can effectively protect against this vulnerability. The following table lists rule base versions of NSFOCUS security products.
|Product||Rule Base Version||Update Package Download Link||Rule ID|
For how to update rule bases, click the following links:
4.2.1 Deleting Axis
If Axis is not needed in the current system, delete the axis.jar file in the lib directory. Users are advised to back up the file before deleting it, so as to avoid service interruption.
4.2.2 Disabling Axis Remote Management
Locate the server-config.wsdd file in the website directory and open it with a text editor. Then set enableRemoteAdmin to false.
4.2.3 Custom Protection Rule on NSFOCUS WAF
NSFOCUS Web Application Firewall (WAF) users can set a custom rule for temporary protection. The procedure is as follows:
Choose Security Management > Rule Database Management > Custom Rules > Custom and click Create.
In the dialog box that appears, set Inspection Object to URI, Matching Relationship to Regular Expression Equal to, and Inspection Value to /services/(AdminService|FreeMarkerService.
Apply this custom rule to virtual websites (if any).
The verification is as follows:
This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.
NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.
For more information about NSFOCUS, please visit:
NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.