Описание
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1.10-2~18.04.1 |
| devel | not-affected | 1.12-1.1 |
| eoan | ignored | end of life |
| esm-apps/bionic | released | 1.10-2~18.04.1 |
| esm-apps/focal | released | 1.12-1ubuntu0.1 |
| esm-apps/jammy | not-affected | 1.12-1.1 |
| esm-apps/xenial | released | 1.8-3ubuntu1+esm1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was released [1.7.ubuntu-8ubuntu2.14.04.3+esm1] |
| focal | released | 1.12-1ubuntu0.1 |
| groovy | not-affected | 1.12-1.1 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Apache Batik is vulnerable to server-side request forgery, caused by i ...
EPSS
5 Medium
CVSS2
7.5 High
CVSS3