CVE-2023-40743 - Critical Axis library vulnerability
The Axis 1.x library has a reported critical vulnerability in it. The 1.4.1 version of Axis is included in Birt 4.9.0 and 4.13.0. This library is EOL and the recommended fix is to switch to a different SOAP library (like Axis 2.x).
Do you have any plans to help solve this problem?
I'm sorry, I don't.
As I understand it, the 1.4.1 version in BIRT is one that fixes the CVE in 1.4.0. While it would still be good to switch to Axis, 2.x the linked CVE does not apply.
As I understand it, the 1.4.1 version in BIRT is one that fixes the CVE in 1.4.0. While it would still be good to switch to Axis, 2.x the linked CVE does not apply.
My reading of the CVE itself is that all 1.x versions of Axis are affected. Where are you seeing that 1.4.1 fixes this issue?
It looks like this CVE is fixed with this commit https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 Apache Axis 1 is in some regard maintained, But since there are no new versions of it there are no other way of receiving the fixes but building Axis1 from source one self. That will fix the CVE but the security scanner will still complain.
This issue is addressed by the use of 1.4.1:
https://github.com/eclipse-orbit/orbit-simrel/issues/16