Server-Side Request Forgery (SSRF) Affecting batik package, versions <1.12-4+deb11u1
Threat Intelligence
EPSS
1.1% (85th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-BATIK-3062858
- published 26 Oct 2022
- disclosed 25 Oct 2022
Introduced: 25 Oct 2022
CVE-2022-41704 Open this link in a new tabHow to fix?
Upgrade Debian:11 batik to version 1.12-4+deb11u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream batik package and not the batik package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
A vulnerability in Batik of Apache XML Graphics allows an attacker to run untrusted Java code from an SVG. This issue affects Apache XML Graphics prior to 1.16. It is recommended to update to version 1.16.
References
- https://security-tracker.debian.org/tracker/CVE-2022-41704
- http://www.openwall.com/lists/oss-security/2022/10/25/2
- https://lists.apache.org/thread/hplhx0o74jb7blj39fm4kw3otcnjd6xf
- https://lists.debian.org/debian-lts-announce/2022/10/msg00038.html
- https://www.debian.org/security/2022/dsa-5264
- https://security.gentoo.org/glsa/202401-11
CVSS Scores
version 3.1