|
|
Message-ID: <001301d642f3$32a10d70$97e32850$@gmail.com>
Date: Mon, 15 Jun 2020 09:58:53 +0100
From: "Simon Steiner" <simonsteiner1984@...il.com>
To: <oss-security@...ts.openwall.com>
Subject: [CVE-2019-17566] Apache XML Graphics Batik SSRF vulnerability
CVE-2019-17566:
Apache XML Graphics Batik SSRF vulnerability
Severity:
Medium
Vendor:
The Apache Software Foundation
Versions Affected:
Batik 1.12 and earlier
Description:
The Apache Batik library is vulnerable to SSRF via "xlink:href"
attributes that allow an
attacker to cause the underlying server to make arbitrary GET requests.
Mitigation:
Users should upgrade to Batik 1.13 or later and pass
-blockExternalResources on the command line
Credit:
This issue was independently reported by Sean Melia
References:
http://xmlgraphics.apache.org/security.html
The Apache XML Graphics team.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.