Description
In order to check for soap Fault, I'm using the axiom_soap_body_has_fault with an axiom_xml_reader of kind AXIS2_XML_PARSER_TYPE_BUFFER.
If the soap Body contains some XML escape sequences (&, <, ...), since the XML sequence escaping is done in place by the guththila_token_evaluate_references function, the Soap buffer is then corrupted.
For example if the soap Body contains
<urlAddress>http://test.net/application?event=callBack&pageid=test&flowId=justification&portletid=test&STATUS=OK</urlAddress>
after the call to axiom_soap_body_has_fault , the buffer then contains:
<urlAddress>http://test.net/application?event=callBack&pageid=test&flowId=justification&portletid=test&STATUS=OKst&STATUS=OK</urlAddress>
which is bad.