Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
Batik
Subscribe
|
|
Oracle
Subscribe
|
Api Gateway
Subscribe
Business Intelligence
Subscribe
Communications Application Session Controller
Subscribe
Communications Metasolv Solution
Subscribe
Communications Offline Mediation Controller
Subscribe
Enterprise Repository
Subscribe
Financial Services Analytical Applications Infrastructure
Subscribe
Fusion Middleware Mapviewer
Subscribe
Hospitality Opera 5
Subscribe
Hyperion Financial Reporting
Subscribe
Instantis Enterprisetrack
Subscribe
Jd Edwards Enterpriseone Tools
Subscribe
Retail Integration Bus
Subscribe
Retail Order Broker
Subscribe
Retail Order Management System Cloud Service
Subscribe
Retail Point-of-service
Subscribe
Retail Returns Management
Subscribe
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cmx4-p4v5-hmr5 | Server-side request forgery (SSRF) in Apache Batik |
Ubuntu USN |
USN-6117-1 | Apache Batik vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-05T01:40:15.834Z
Reserved: 2019-10-14T00:00:00.000Z
Link: CVE-2019-17566
No data.
Status : Modified
Published: 2020-11-12T18:15:12.567
Modified: 2024-11-21T04:32:32.617
Link: CVE-2019-17566
OpenCVE Enrichment
No data.
Github GHSA
Ubuntu USN