Description
Apache Axis2 contains a flaw that may allow a remote attacker to access arbitrary files. A remote attacker could send a specially-crafted URL request using the xsd parameter to specify a malicious file from the local system, which could allow the attacker to obtain sensitive information or execute arbitrary code on the vulnerable Web server.
Remediation
Upgrade to the latest version of Apache Axis2. This issue was fixed in Apache Axis2 version 1.4.1.
References
Apache Axis2 local file inclusion
Local File Inclusion Vulnerability on parsing WSDL related XSD Files
Related Vulnerabilities
WordPress Plugin Ninja Popups Multiple Vulnerabilities (4.5.3)
WordPress Plugin jQuery Mega Menu Widget 'skin' Parameter Local File Include (1.0)
WordPress Plugin Recent Backups Arbitrary File Download (0.7)
WordPress Plugin True Ranker Directory Traversal (2.2.2)
WordPress Plugin Revamp CRM for WooCommerce Local File Inclusion (1.0.3)