Описание
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
Отчет
This flaw does not affect xmlgraphics-commons as shipped with Red Hat Enterprise Linux 8. It is out of support scope for Red Hat Enterprise Linux 6 and 7. To learn more about support scope for Red Hat Enterprise Linux, please see https://access.redhat.com/support/policy/updates/errata/ .
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat BPM Suite 6 | xmlgraphics-commons | Out of support scope | ||
| Red Hat CodeReady Studio 12 | xmlgraphics-commons | Will not fix | ||
| Red Hat Developer Tools | rh-eclipse-xmlgraphics-commons | Affected | ||
| Red Hat Enterprise Linux 6 | xmlgraphics-commons | Out of support scope | ||
| Red Hat Enterprise Linux 7 | xmlgraphics-commons | Out of support scope | ||
| Red Hat Enterprise Linux 8 | eclipse | Not affected | ||
| Red Hat Enterprise Linux 9 | xmlgraphics-commons | Affected | ||
| Red Hat Integration Camel K 1 | xmlgraphics-commons | Not affected | ||
| Red Hat JBoss BRMS 5 | xmlgraphics-commons | Out of support scope | ||
| Red Hat JBoss Fuse 6 | xmlgraphics-commons | Out of support scope |
Показывать по
Дополнительная информация
Статус:
EPSS
8.2 High
CVSS3
Связанные уязвимости
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-sid ...
Server-side request forgery (SSRF) in Apache XmlGraphics Commons
EPSS
8.2 High
CVSS3