{"id":8889,"date":"2019-06-21T03:11:04","date_gmt":"2019-06-21T03:11:04","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8889"},"modified":"2026-04-17T18:07:52","modified_gmt":"2026-04-17T18:07:52","slug":"apache-axis-remote-code-execution-0-day-vulnerability-handling-guide","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/","title":{"rendered":"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<ol>\n<li>\n<h2><strong><a name=\"_Toc130115382\"><\/a> Vulnerability Overview<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command execution vulnerability, which allows attackers to obtain privileges of the target server and remotely execute commands without authorization by sending a crafted HTTP-POST request.<!--more--><\/p>\n<p>Apache Axis is an open-source XML-based web service framework. It consists of a Java and a C++ implementation of the SOAP server, and various utilities and APIs for generating and deploying web service applications. Using Apache Axis, developers can create interoperable and distributed computing applications.<\/p>\n<ol start=\"2\">\n<li>\n<h2><strong>Scope of Impact<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p><strong>Affected Versions<\/strong><\/p>\n<ul>\n<li>Apache Axis &lt;= 1.4<\/li>\n<\/ul>\n<ol start=\"3\">\n<li>\n<h2><strong>Vulnerability Check<\/strong><\/h2>\n<\/li>\n<\/ol>\n<h3><strong>3.1 Manual Check<\/strong><\/h3>\n<p>Axis users can locate the server-config.wsdd file in the website directory and then open it with a text editor. If the value of <strong>enableRemoteAdmin<\/strong> is <strong>true<\/strong>, it indicates that this vulnerability exists.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-8890\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"567\" height=\"119\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-1.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-1-300x63.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/a><\/p>\n<ol start=\"4\">\n<li>\n<h2><strong>Vulnerability Protection<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Protection with Security Products<\/p>\n<h3><strong>4.1.1 Customer-Side Product Protection<\/strong><\/h3>\n<p>To defend against this vulnerability, NSFOCUS has released rule update packages for its security products. Users are strongly recommended to update rule bases to the latest version to ensure that these security products can effectively protect against this vulnerability. The following table lists rule base versions of NSFOCUS security products.<\/p>\n<table width=\"581\">\n<tbody>\n<tr>\n<td width=\"121\"><strong>Product<\/strong><\/td>\n<td width=\"113\"><strong>Rule Base Version<\/strong><\/td>\n<td width=\"262\"><strong>Update Package Download Link<\/strong><\/td>\n<td width=\"85\"><strong>Rule ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"121\"><strong>NIPS<\/strong><\/td>\n<td width=\"113\">5.6.8.784<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/29480<\/td>\n<td rowspan=\"3\" width=\"85\">24508<\/td>\n<\/tr>\n<tr>\n<td width=\"113\">5.6.9.20521<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/29486<\/td>\n<\/tr>\n<tr>\n<td width=\"113\">5.6.10.20521<\/td>\n<td width=\"262\">9http:\/\/update.nsfocus.com\/update\/downloads\/id\/29487<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"121\"><strong>WAF<\/strong><\/td>\n<td width=\"113\">6.0.7.0.41869<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/29482<\/td>\n<td rowspan=\"3\" width=\"85\">27526167<\/p>\n<p>27526168<\/td>\n<\/tr>\n<tr>\n<td width=\"113\">6.0.5.1.41873<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/29484<\/td>\n<\/tr>\n<tr>\n<td width=\"113\">6.0.4.1.41873<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/29485<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>For how to update rule bases, click the following links:<\/p>\n<p>NIPS: <a href=\"https:\/\/mp.weixin.qq.com\/s\/JsRktENQNj1TdZSU62N0Ww\">https:\/\/mp.weixin.qq.com\/s\/JsRktENQNj1TdZSU62N0Ww<\/a><\/p>\n<p>WAF: <a href=\"https:\/\/mp.weixin.qq.com\/s\/oubjPqR4DURWPvrQ9W9mWA\">https:\/\/mp.weixin.qq.com\/s\/oubjPqR4DURWPvrQ9W9mWA<\/a><\/p>\n<ul>\n<li>Workarounds<\/li>\n<\/ul>\n<h3><strong>4.2.1 Deleting Axis<\/strong><\/h3>\n<p>If Axis is not needed in the current system, delete the axis.jar file in the <strong>lib<\/strong> directory. Users are advised to back up the file before deleting it, so as to avoid service interruption.<\/p>\n<h3><strong>4.2.2 Disabling Axis Remote Management<\/strong><\/h3>\n<p>Locate the <strong>server-config.wsdd<\/strong> file in the website directory and open it with a text editor. Then set <strong>enableRemoteAdmin<\/strong> to <strong>false<\/strong>.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8891\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"567\" height=\"111\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-2.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-2-300x59.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/a><\/p>\n<h3><strong>4.2.3 Custom Protection Rule on NSFOCUS WAF<\/strong><\/h3>\n<p>NSFOCUS Web Application Firewall (WAF) users can set a custom rule for temporary protection. The procedure is as follows:<\/p>\n<p>Choose <strong>Security Management &gt; Rule Database Management &gt; Custom Rules &gt; Custom<\/strong> and click <strong>Create<\/strong>.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8892\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"236\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-3.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-3-300x133.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p>In the dialog box that appears, set <strong>Inspection<\/strong> <strong>Object<\/strong> to <strong>URI<\/strong>, <strong>Matching Relationship<\/strong> to <strong>Regular Expression Equal to<\/strong>, and <strong>Inspection<\/strong> <strong>Value<\/strong> to <strong>\/services\/(AdminService|FreeMarkerService<\/strong>.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8893\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"401\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-4.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-4-300x227.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p>Apply this custom rule to virtual websites (if any).<\/p>\n<p>The verification is as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8894\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"182\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-5.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/0621-5-300x103.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.<\/p>\n<p>For more information about NSFOCUS, please visit:<\/p>\n<p>https:\/\/www.nsfocusglobal.com.<\/p>\n<p>NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Overview Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command execution vulnerability, which allows attackers to obtain privileges of the target server and remotely execute commands without authorization by sending a crafted HTTP-POST request.<\/p>\n","protected":false},"author":1,"featured_media":8563,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[33],"class_list":["post-8889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-0-day-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Overview Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-21T03:11:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/RSA2019.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Overview Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/RSA2019.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide\",\"datePublished\":\"2019-06-21T03:11:04+00:00\",\"dateModified\":\"2026-04-17T18:07:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/\"},\"wordCount\":649,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/RSA2019.jpg\",\"keywords\":[\"0-Day Vulnerability\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/\",\"name\":\"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/RSA2019.jpg\",\"datePublished\":\"2019-06-21T03:11:04+00:00\",\"dateModified\":\"2026-04-17T18:07:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/RSA2019.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/RSA2019.jpg\",\"width\":532,\"height\":367,\"caption\":\"Holographic technology displaying data and graphs.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/","og_locale":"pt_BR","og_type":"article","og_title":"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide - NSFOCUS","og_description":"Vulnerability Overview Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command","og_url":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/","og_site_name":"NSFOCUS","article_published_time":"2019-06-21T03:11:04+00:00","article_modified_time":"2026-04-17T18:07:52+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/RSA2019.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide - NSFOCUS","twitter_description":"Vulnerability Overview Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/RSA2019.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide","datePublished":"2019-06-21T03:11:04+00:00","dateModified":"2026-04-17T18:07:52+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/"},"wordCount":649,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/RSA2019.jpg","keywords":["0-Day Vulnerability"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/","url":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/","name":"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/RSA2019.jpg","datePublished":"2019-06-21T03:11:04+00:00","dateModified":"2026-04-17T18:07:52+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/RSA2019.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/RSA2019.jpg","width":532,"height":367,"caption":"Holographic technology displaying data and graphs."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apache-axis-remote-code-execution-0-day-vulnerability-handling-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8889"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8889\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8563"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}