Home / Vulnerability Database / Java : Apache Axis2 unsafe configuration
Java
Java : Apache Axis2 unsafe configuration
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
Overview
Insecure Apache Axis 2 configuration: the REST protocol that does not ensure data integrity and confidentiality is used for data transmission.
If the application communicates with other services, messaging security is defined by the least secure chain link. REST does not include data security mechanisms and completely relies on the transport level protocols.
References
- CWE-311: Missing Encryption of Sensitive Data
- CWE-319: Cleartext Transmission of Sensitive Information
- OWASP Top 10 2017-A6-Security Misconfiguration
- OWASP Top 10 2013-A5-Security Misconfiguration
- CWE CATEGORY: OWASP Top Ten 2017 Category A5 - Broken Access Control
- CWE CATEGORY: OWASP Top Ten 2017 Category A6 - Security Misconfiguration
MEDIUM
DerScanner Severity Score
Do you want to fix Java : Apache Axis2 unsafe configuration in your application?
See also
Java
Java : Race condition
Java
Java : Text4Shell Vulnerability
Java
