Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-17566

Опубликовано: 12 нояб. 2020
Источник: debian

Описание

Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
batikfixed1.12-1.1package
batikfixed1.10-2+deb10u1busterpackage
batikfixed1.8-4+deb9u2stretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2020/06/15/2

  • patch: http://svn.apache.org/viewvc?view=revision&revision=1871084

  • corresponding bug: https://issues.apache.org/jira/browse/BATIK-1276

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 5 лет назад

Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVSS3: 7.5
redhat
больше 5 лет назад

Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVSS3: 7.5
nvd
около 5 лет назад

Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

suse-cvrf
больше 5 лет назад

Security update for xmlgraphics-batik

suse-cvrf
больше 5 лет назад

Security update for xmlgraphics-batik