Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.
On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/08/22/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/22/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/22/4 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/22/4 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 | Mailing List Vendor Advisory |
https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 | Mailing List Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html | Mailing List |
https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html | Mailing List |
https://security.gentoo.org/glsa/202401-11 | |
https://security.gentoo.org/glsa/202401-11 | |
https://xmlgraphics.apache.org/security.html | Vendor Advisory |
https://xmlgraphics.apache.org/security.html | Vendor Advisory |
Configurations
History
13 Feb 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References | () http://www.openwall.com/lists/oss-security/2023/08/22/4 - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2023/08/22/2 - Mailing List, Third Party Advisory | |
References | () https://xmlgraphics.apache.org/security.html - Vendor Advisory | |
References | () https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 - Mailing List, Vendor Advisory | |
Summary | Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16. On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later. |
07 Jan 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Oct 2023, 02:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
First Time |
Debian
Debian debian Linux |
|
References | (MISC) https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html - Mailing List |
15 Oct 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Aug 2023, 02:13
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://xmlgraphics.apache.org/security.html - Vendor Advisory | |
References | (MISC) http://www.openwall.com/lists/oss-security/2023/08/22/4 - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 - Mailing List, Vendor Advisory | |
References | (MISC) http://www.openwall.com/lists/oss-security/2023/08/22/2 - Mailing List, Third Party Advisory | |
First Time |
Apache
Apache xml Graphics Batik |
|
CPE | cpe:2.3:a:apache:xml_graphics_batik:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
23 Aug 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Aug 2023, 19:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-22 19:16
Updated : 2025-02-13 17:15
NVD link : CVE-2022-44729
Mitre link : CVE-2022-44729
JSON object : View
Products Affected
debian
- debian_linux
apache
- xml_graphics_batik
CWE
No CWE.