Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.
On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2023/08/22/2 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2023/08/22/4 | Mailing List Third Party Advisory |
| https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 | Mailing List Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html | Mailing List |
| https://security.gentoo.org/glsa/202401-11 | |
| https://xmlgraphics.apache.org/security.html | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-08-22 19:16
Updated : 2024-01-07 11:15
NVD link : CVE-2022-44729
Mitre link : CVE-2022-44729
CVE.ORG link : CVE-2022-44729
JSON object : View
Products Affected
debian
- debian_linux
apache
- xml_graphics_batik
CWE
CWE-918
Server-Side Request Forgery (SSRF)
