Description
Apache Axis2 contains a flaw that may allow a remote attacker to access arbitrary files. A remote attacker could send a specially-crafted URL request using the xsd parameter to specify a malicious file from the local system, which could allow the attacker to obtain sensitive information or execute arbitrary code on the vulnerable Web server.
Remediation
Upgrade to the latest version of Apache Axis2. This issue was fixed in Apache Axis2 version 1.4.1.
References
Apache Axis2 local file inclusion
Local File Inclusion Vulnerability on parsing WSDL related XSD Files
Related Vulnerabilities
WordPress Plugin Mail Masta Local File Inclusion (1.0)
SAP weak/predictable user credentials
WordPress Plugin HB AUDIO GALLERY LITE Arbitrary File Download (1.0.0)
Nginx memory disclosure with specially crafted HTTP backend responses
WordPress Plugin WP e-Commerce Shop Styling Local File Inclusion (2.9.1)