CVE-2020-11988

NameCVE-2020-11988
DescriptionApache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs984949

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xmlgraphics-commons (PTS)bullseye (security), bullseye2.4-2~deb11u1fixed
bookworm2.8-2fixed
sid, trixie2.10-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xmlgraphics-commonssourcestretch(not affected)
xmlgraphics-commonssourcebuster2.3-1+deb10u1
xmlgraphics-commonssourcebullseye2.4-2~deb11u1
xmlgraphics-commonssource(unstable)2.4-2984949

Notes

[stretch] - xmlgraphics-commons <not-affected> (Vulnerable code is not present)
https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183
https://issues.apache.org/jira/browse/XGC-122

Search for package or bug name: Reporting problems