<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:oracle:communications_order_and_service_management:7.3.0.0.0:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3aoraclecommunications_order_and_service_management7.3.0.0.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 13:01:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3aoraclecommunications_order_and_service_management7.3.0.0.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Apache Axis 1.4 Server-Side Request Forgery Vulnerability (CVE-2019-0227) Exploit</title><link>https://feed.craftedsignal.io/briefs/2026-05-apache-axis-ssrf/</link><pubDate>Sat, 16 May 2026 13:01:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-apache-axis-ssrf/</guid><description>A public exploit has been released for CVE-2019-0227, a Server-Side Request Forgery vulnerability in Apache Axis 1.4 and earlier, allowing unauthenticated remote command execution when `enableRemoteAdmin` is true via deployment of a malicious webservice and webshell.</description><content:encoded><![CDATA[<p>A public exploit has been published detailing a Server-Side Request Forgery (SSRF) vulnerability in Apache Axis version 1.4 and earlier, tracked as CVE-2019-0227. The vulnerability can lead to remote command execution (RCE) if the <code>enableRemoteAdmin</code> attribute is set to <code>true</code>. An attacker can leverage the <code>AdminService</code> interface to deploy a malicious WebService and use a <code>LogHandler</code> to write a Webshell. The availability of a working exploit, particularly the <code>axis_exp.py</code> Python script, significantly increases the risk to unpatched Apache Axis installations with the <code>enableRemoteAdmin</code> setting enabled. This script automates the deployment of malicious services and facilitates interactive command execution on the compromised server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a POST request to <code>/axis/services/AdminService</code> to deploy a malicious service.</li>
<li>The deployed service creates a <code>RandomService</code> that triggers a <code>RandomLog</code> on each request.</li>
<li>The <code>RandomLog</code> handler is configured to write a JSP webshell (e.g., <code>shell.jsp</code>) to the web application&rsquo;s root directory (e.g., <code>../webapps/ROOT/shell.jsp</code>).</li>
<li>The attacker sends a POST request to <code>/axis/services/RandomService</code> to trigger the <code>RandomLog</code> handler and write the JSP webshell.</li>
<li>The webshell writes JSP code from the request into the <code>shell.jsp</code> file.</li>
<li>The attacker sends a GET request to <code>/shell.jsp?c=command</code>, where <code>command</code> is the system command to execute.</li>
<li>The server executes the command passed in the <code>c</code> parameter and returns the result.</li>
<li>The attacker gains arbitrary code execution on the target system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary system commands on the target server. This can lead to complete system compromise, data theft, and deployment of further malicious payloads. The exploit tool automates webshell deployment, lowering the barrier to entry for attackers. Exposed Apache Axis installations are vulnerable if the <code>enableRemoteAdmin</code> setting is enabled, and if exploited can result in significant data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Disable the <code>enableRemoteAdmin</code> attribute in the Apache Axis configuration to prevent remote administration as detailed in the advisory.</li>
<li>Monitor webserver logs for POST requests to <code>/axis/services/AdminService</code> as a potential indicator of exploit attempts (see the rule &ldquo;Detect CVE-2019-0227 Exploitation Attempt via AdminService&rdquo;).</li>
<li>Implement access controls to restrict access to the <code>/services/AdminService</code> endpoint.</li>
<li>Deploy the Sigma rule &ldquo;Detect Webshell Creation via Axis LogHandler&rdquo; to identify webshell creation attempts via the LogHandler.</li>
<li>Monitor webserver logs for GET requests to JSP files in the web application&rsquo;s root directory with a &lsquo;c&rsquo; parameter for command execution as indicators of compromise.</li>
<li>Upgrade to a supported and patched version of Apache Axis or migrate to another web service framework.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>rce</category><category>apache</category></item></channel></rss>