Uploaded image for project: 'Axis2-C'
  1. Axis2-C
  2. AXIS2C-1475

Bad interaction between AXIS2_XML_PARSER_TYPE_BUFFER, axiom_soap_body_has_fault and XML escape sequence

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Open
    • Major
    • Resolution: Unresolved
    • 1.6.0
    • 1.7.0
    • guththila
    • None

    Description

      In order to check for soap Fault, I'm using the axiom_soap_body_has_fault with an axiom_xml_reader of kind AXIS2_XML_PARSER_TYPE_BUFFER.
      If the soap Body contains some XML escape sequences (&, <, ...), since the XML sequence escaping is done in place by the guththila_token_evaluate_references function, the Soap buffer is then corrupted.
      For example if the soap Body contains
      <urlAddress>http://test.net/application?event=callBack&amp;pageid=test&amp;flowId=justification&amp;portletid=test&amp;STATUS=OK</urlAddress>
      after the call to axiom_soap_body_has_fault , the buffer then contains:
      <urlAddress>http://test.net/application?event=callBack&pageid=test&flowId=justification&portletid=test&STATUS=OKst&amp;STATUS=OK</urlAddress>
      which is bad.

      Attachments

        Activity

          People

            Unassigned Unassigned
            sbigot Sebastien Bigot
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

            Dates

              Created:
              Updated: