Uploaded image for project: 'Axis2-C'
  1. Axis2-C
  2. AXIS2C-1475

Bad interaction between AXIS2_XML_PARSER_TYPE_BUFFER, axiom_soap_body_has_fault and XML escape sequence

    XMLWordPrintableJSON

    Details

    • Type: Bug
    • Status: Open
    • Priority: Major
    • Resolution: Unresolved
    • Affects Version/s: 1.6.0
    • Fix Version/s: 1.7.0
    • Component/s: guththila
    • Labels:
      None

      Description

      In order to check for soap Fault, I'm using the axiom_soap_body_has_fault with an axiom_xml_reader of kind AXIS2_XML_PARSER_TYPE_BUFFER.
      If the soap Body contains some XML escape sequences (&, <, ...), since the XML sequence escaping is done in place by the guththila_token_evaluate_references function, the Soap buffer is then corrupted.
      For example if the soap Body contains
      <urlAddress>http://test.net/application?event=callBack&amp;pageid=test&amp;flowId=justification&amp;portletid=test&amp;STATUS=OK</urlAddress>
      after the call to axiom_soap_body_has_fault , the buffer then contains:
      <urlAddress>http://test.net/application?event=callBack&pageid=test&flowId=justification&portletid=test&STATUS=OKst&amp;STATUS=OK</urlAddress>
      which is bad.

        Attachments

          Activity

            People

            • Assignee:
              Unassigned
              Reporter:
              sbigot Sebastien Bigot
            • Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

              Dates

              • Created:
                Updated: