CVE-2019-17566

NameCVE-2019-17566
DescriptionApache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs964510

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
batik (PTS)buster1.10-2+deb10u1fixed
buster (security)1.10-2+deb10u3fixed
bullseye1.12-4+deb11u2fixed
bullseye (security)1.12-4+deb11u1fixed
bookworm1.16+dfsg-1+deb12u1fixed
sid, trixie1.17+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
batiksourcestretch1.8-4+deb9u2
batiksourcebuster1.10-2+deb10u1
batiksource(unstable)1.12-1.1964510

Notes

https://www.openwall.com/lists/oss-security/2020/06/15/2
patch: http://svn.apache.org/viewvc?view=revision&revision=1871084
corresponding bug: https://issues.apache.org/jira/browse/BATIK-1276

Search for package or bug name: Reporting problems