Описание
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1.10-2~18.04.1 |
| devel | needs-triage | |
| esm-apps/bionic | released | 1.10-2~18.04.1 |
| esm-apps/focal | released | 1.12-1ubuntu0.1 |
| esm-apps/jammy | not-affected | 1.14-1 |
| esm-apps/noble | needs-triage | |
| esm-apps/xenial | released | 1.8-3ubuntu1+esm1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was released [1.7.ubuntu-8ubuntu2.14.04.3+esm1] |
| focal | released | 1.12-1ubuntu0.1 |
| groovy | ignored | end of life |
Показывать по
EPSS
6.4 Medium
CVSS2
8.2 High
CVSS3
Связанные уязвимости
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Apache Batik 1.13 is vulnerable to server-side request forgery, caused ...
Server-side request forgery (SSRF) in Apache Batik
EPSS
6.4 Medium
CVSS2
8.2 High
CVSS3