Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
03 Nov 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2021-02-24 18:15
Updated : 2025-11-03 20:15
NVD link : CVE-2020-11987
Mitre link : CVE-2020-11987
CVE.ORG link : CVE-2020-11987
JSON object : View
Products Affected
apache
- batik
oracle
- flexcube_universal_banking
- retail_order_broker
- retail_point-of-service
- banking_digital_experience
- communications_application_session_controller
- communications_metasolv_solution
- retail_returns_management
- weblogic_server
- banking_apis
- product_lifecycle_analytics
- retail_order_management_system_cloud_service
- instantis_enterprisetrack
- insurance_policy_administration
- agile_engineering_data_management
- retail_central_office
- fusion_middleware_mapviewer
- enterprise_repository
- retail_back_office
- communications_offline_mediation_controller
debian
- debian_linux
fedoraproject
- fedora
