Name | CVE-2020-11988 |
Description | Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 984949 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
xmlgraphics-commons (PTS) | bullseye (security), bullseye | 2.4-2~deb11u1 | fixed |
bookworm | 2.8-2 | fixed | |
sid, trixie | 2.10-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
xmlgraphics-commons | source | stretch | (not affected) | |||
xmlgraphics-commons | source | buster | 2.3-1+deb10u1 | |||
xmlgraphics-commons | source | bullseye | 2.4-2~deb11u1 | |||
xmlgraphics-commons | source | (unstable) | 2.4-2 | 984949 |
[stretch] - xmlgraphics-commons <not-affected> (Vulnerable code is not present)
https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183
https://issues.apache.org/jira/browse/XGC-122