Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/712c9xwtmyghyokzrm2ml6sps4xlmbsx | Mailing List Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html | Mailing List |
https://security.gentoo.org/glsa/202401-11 | |
https://lists.apache.org/thread/712c9xwtmyghyokzrm2ml6sps4xlmbsx | Mailing List Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html | Mailing List |
https://security.gentoo.org/glsa/202401-11 |
Configurations
History
21 Nov 2024, 07:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-09-22 15:15
Updated : 2024-11-21 07:16
NVD link : CVE-2022-38398
Mitre link : CVE-2022-38398
CVE.ORG link : CVE-2022-38398
JSON object : View
Products Affected
debian
- debian_linux
apache
- batik
CWE
CWE-918
Server-Side Request Forgery (SSRF)