Description
Apache Axis2 installation includes a JSP page accessible at axis2-web/HappyAxis.jsp that discloses a lot of sensitive information. An attacker could use this information to conduct further attacks.
Remediation
If you don't want this information to be publicly accessible you need to restrict access to the /axis2-web/ directory.
References
Related Vulnerabilities
Roundcube Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5382)
Typo3 Admin publicly accessible
WordPress Plugin Timetable and Event Schedule by MotoPress Information Disclosure (2.3.19)
SharePoint exposed web services
WordPress Plugin User Meta Manager Information Disclosure (3.4.7)