Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2020-11-12 18:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-17566
Mitre link : CVE-2019-17566
CVE.ORG link : CVE-2019-17566
JSON object : View
Products Affected
oracle
- retail_integration_bus
- communications_offline_mediation_controller
- jd_edwards_enterpriseone_tools
- business_intelligence
- instantis_enterprisetrack
- hospitality_opera_5
- communications_application_session_controller
- hyperion_financial_reporting
- api_gateway
- financial_services_analytical_applications_infrastructure
- retail_order_broker
- communications_metasolv_solution
- retail_order_management_system_cloud_service
- retail_returns_management
- enterprise_repository
- retail_point-of-service
- fusion_middleware_mapviewer
apache
- batik
CWE
CWE-918
Server-Side Request Forgery (SSRF)