Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.
On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/08/22/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/22/4 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 | Mailing List Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html | Mailing List |
https://security.gentoo.org/glsa/202401-11 | |
https://xmlgraphics.apache.org/security.html | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/08/22/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/22/4 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 | Mailing List Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html | Mailing List |
https://security.gentoo.org/glsa/202401-11 | |
https://xmlgraphics.apache.org/security.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/08/22/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/08/22/4 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 - Mailing List, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html - Mailing List | |
References | () https://security.gentoo.org/glsa/202401-11 - | |
References | () https://xmlgraphics.apache.org/security.html - Vendor Advisory |
07 Jan 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Oct 2023, 02:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
First Time |
Debian debian Linux
Debian |
|
References | (MISC) https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html - Mailing List |
15 Oct 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Aug 2023, 02:13
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://www.openwall.com/lists/oss-security/2023/08/22/2 - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2 - Mailing List, Vendor Advisory | |
References | (MISC) https://xmlgraphics.apache.org/security.html - Vendor Advisory | |
References | (MISC) http://www.openwall.com/lists/oss-security/2023/08/22/4 - Mailing List, Third Party Advisory | |
First Time |
Apache
Apache xml Graphics Batik |
|
CPE | cpe:2.3:a:apache:xml_graphics_batik:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
23 Aug 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-22 19:16
Updated : 2024-11-21 07:28
NVD link : CVE-2022-44729
Mitre link : CVE-2022-44729
CVE.ORG link : CVE-2022-44729
JSON object : View
Products Affected
debian
- debian_linux
apache
- xml_graphics_batik
CWE
CWE-918
Server-Side Request Forgery (SSRF)