The SVG Salamander (aka svgSalamander) library, when used in a web application, allows remote attackers to conduct server-side request forgery (SSRF) attacks via an xlink:href attribute in an SVG file.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3781 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/27/3 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/01/29/2 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/95871 | Third Party Advisory VDB Entry |
https://github.com/blackears/svgSalamander/issues/11 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3V7RIIO3HO4RNDBN2PARLIDAL3RPV2OX/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPUOI6NCEB6H6YHKN7M4V3CAQD63NXAU/ | |
https://security.gentoo.org/glsa/202003-11 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-03-16 15:59
Updated : 2023-11-07 02:49
NVD link : CVE-2017-5617
Mitre link : CVE-2017-5617
CVE.ORG link : CVE-2017-5617
JSON object : View
Products Affected
debian
- debian_linux
kitfox
- svg_salamander
CWE
CWE-918
Server-Side Request Forgery (SSRF)