|
Message-ID: <000801d70aa4$bbfa3410$33ee9c30$@gmail.com> Date: Wed, 24 Feb 2021 12:01:06 -0000 From: "Simon Steiner" <simonsteiner1984@...il.com> To: <oss-security@...ts.openwall.com> Subject: [CVE-2020-11987] Apache XML Graphics Batik SSRF vulnerability CVE-2020-11987: Apache XML Graphics Batik SSRF vulnerability Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Batik 1.13 and earlier Description: The Apache Batik library is vulnerable to SSRF via the NodePickerPanel that allow an attacker to cause the underlying server to make arbitrary GET requests. Mitigation: Users should upgrade to Batik 1.13 or later Credit: This issue was independently reported by 张相浩 References: http://xmlgraphics.apache.org/security.html The Apache XML Graphics team.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.