Server-Side Request Forgery (SSRF) Affecting batik package, versions <1.12-4+deb11u2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-BATIK-5849973
- published 23 Aug 2023
- disclosed 22 Aug 2023
Introduced: 22 Aug 2023
CVE-2022-44729 Open this link in a new tabHow to fix?
Upgrade Debian:11 batik to version 1.12-4+deb11u2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream batik package and not the batik package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.
On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
References
- https://security-tracker.debian.org/tracker/CVE-2022-44729
- https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2
- https://xmlgraphics.apache.org/security.html
- http://www.openwall.com/lists/oss-security/2023/08/22/2
- http://www.openwall.com/lists/oss-security/2023/08/22/4
- https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html
- https://security.gentoo.org/glsa/202401-11