Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

Project Subscriptions

Vendors Products
Api Gateway Subscribe
Business Intelligence Subscribe
Communications Application Session Controller Subscribe
Communications Metasolv Solution Subscribe
Communications Offline Mediation Controller Subscribe
Enterprise Repository Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Fusion Middleware Mapviewer Subscribe
Hospitality Opera 5 Subscribe
Hyperion Financial Reporting Subscribe
Instantis Enterprisetrack Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Retail Integration Bus Subscribe
Retail Order Broker Subscribe
Retail Order Management System Cloud Service Subscribe
Retail Point-of-service Subscribe
Retail Returns Management Subscribe
Jboss Enterprise Bpms Platform Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Fuse Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cmx4-p4v5-hmr5 Server-side request forgery (SSRF) in Apache Batik
Ubuntu USN Ubuntu USN USN-6117-1 Apache Batik vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-05T01:40:15.834Z

Reserved: 2019-10-14T00:00:00.000Z

Link: CVE-2019-17566

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-12T18:15:12.567

Modified: 2024-11-21T04:32:32.617

Link: CVE-2019-17566

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-06-15T00:00:00Z

Links: CVE-2019-17566 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses