Description
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cmx4-p4v5-hmr5 | Server-side request forgery (SSRF) in Apache Batik |
Ubuntu USN |
USN-6117-1 | Apache Batik vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Batik
Subscribe
Oracle
Subscribe
Api Gateway
Subscribe
Business Intelligence
Subscribe
Communications Application Session Controller
Subscribe
Communications Metasolv Solution
Subscribe
Communications Offline Mediation Controller
Subscribe
Enterprise Repository
Subscribe
Financial Services Analytical Applications Infrastructure
Subscribe
Fusion Middleware Mapviewer
Subscribe
Hospitality Opera 5
Subscribe
Hyperion Financial Reporting
Subscribe
Instantis Enterprisetrack
Subscribe
Jd Edwards Enterpriseone Tools
Subscribe
Retail Integration Bus
Subscribe
Retail Order Broker
Subscribe
Retail Order Management System Cloud Service
Subscribe
Retail Point-of-service
Subscribe
Retail Returns Management
Subscribe
Redhat
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Enterprise Brms Platform
Subscribe
Jboss Fuse
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-05T01:40:15.834Z
Reserved: 2019-10-14T00:00:00.000Z
Link: CVE-2019-17566
No data.
Status : Modified
Published: 2020-11-12T18:15:12.567
Modified: 2024-11-21T04:32:32.617
Link: CVE-2019-17566
OpenCVE Enrichment
No data.
Github GHSA
Ubuntu USN