Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11987

Опубликовано: 24 фев. 2021
Источник: debian

Описание

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
batikfixed1.14-1package
batikno-dsastretchpackage

Примечания

  • https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6

Связанные уязвимости

CVSS3: 8.2
ubuntu
почти 5 лет назад

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVSS3: 8.2
redhat
почти 5 лет назад

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVSS3: 8.2
nvd
почти 5 лет назад

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVSS3: 8.2
github
около 4 лет назад

Server-side request forgery (SSRF) in Apache Batik

suse-cvrf
почти 2 года назад

Security update for xmlgraphics-batik