Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2021-02-24 18:15
Updated : 2024-02-01 01:24
NVD link : CVE-2020-11987
Mitre link : CVE-2020-11987
CVE.ORG link : CVE-2020-11987
JSON object : View
Products Affected
oracle
- communications_offline_mediation_controller
- fusion_middleware_mapviewer
- retail_central_office
- weblogic_server
- retail_returns_management
- enterprise_repository
- banking_apis
- agile_engineering_data_management
- instantis_enterprisetrack
- retail_point-of-service
- banking_digital_experience
- product_lifecycle_analytics
- flexcube_universal_banking
- insurance_policy_administration
- communications_application_session_controller
- retail_order_broker
- retail_order_management_system_cloud_service
- communications_metasolv_solution
- retail_back_office
fedoraproject
- fedora
debian
- debian_linux
apache
- batik