Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-11987

Опубликовано: 24 фев. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.4
CVSS3: 8.2

Описание

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

РелизСтатусПримечание
bionic

released

1.10-2~18.04.1
devel

needs-triage

esm-apps/bionic

released

1.10-2~18.04.1
esm-apps/focal

released

1.12-1ubuntu0.1
esm-apps/jammy

not-affected

1.14-1
esm-apps/noble

needs-triage

esm-apps/xenial

released

1.8-3ubuntu1+esm1
esm-infra-legacy/trusty

DNE

trusty/esm was released [1.7.ubuntu-8ubuntu2.14.04.3+esm1]
focal

released

1.12-1ubuntu0.1
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 80%
0.01358
Низкий

6.4 Medium

CVSS2

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
redhat
почти 5 лет назад

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVSS3: 8.2
nvd
почти 5 лет назад

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

CVSS3: 8.2
debian
почти 5 лет назад

Apache Batik 1.13 is vulnerable to server-side request forgery, caused ...

CVSS3: 8.2
github
около 4 лет назад

Server-side request forgery (SSRF) in Apache Batik

suse-cvrf
почти 2 года назад

Security update for xmlgraphics-batik

EPSS

Процентиль: 80%
0.01358
Низкий

6.4 Medium

CVSS2

8.2 High

CVSS3