|
Message-ID: <001301d642f3$32a10d70$97e32850$@gmail.com> Date: Mon, 15 Jun 2020 09:58:53 +0100 From: "Simon Steiner" <simonsteiner1984@...il.com> To: <oss-security@...ts.openwall.com> Subject: [CVE-2019-17566] Apache XML Graphics Batik SSRF vulnerability CVE-2019-17566: Apache XML Graphics Batik SSRF vulnerability Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Batik 1.12 and earlier Description: The Apache Batik library is vulnerable to SSRF via "xlink:href" attributes that allow an attacker to cause the underlying server to make arbitrary GET requests. Mitigation: Users should upgrade to Batik 1.13 or later and pass -blockExternalResources on the command line Credit: This issue was independently reported by Sean Melia References: http://xmlgraphics.apache.org/security.html The Apache XML Graphics team.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.