CVE-2022-38398

NameCVE-2022-38398
DescriptionServer-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3619-1
Debian Bugs1020589

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
batik (PTS)buster1.10-2+deb10u1vulnerable
buster (security)1.10-2+deb10u3fixed
bullseye1.12-4+deb11u2vulnerable
bullseye (security)1.12-4+deb11u1vulnerable
bookworm1.16+dfsg-1+deb12u1fixed
sid, trixie1.17+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
batiksourcebuster1.10-2+deb10u3DLA-3619-1
batiksource(unstable)1.15+dfsg-11020589

Notes

[bullseye] - batik <no-dsa> (Minor issue)
https://www.openwall.com/lists/oss-security/2022/09/22/2
https://issues.apache.org/jira/browse/BATIK-1331
http://svn.apache.org/viewvc?view=revision&revision=1903462
https://www.zerodayinitiative.com/blog/2022/10/28/vulnerabilities-in-apache-batik-default-security-controls-ssrf-and-rce-through-remote-class-loading

Search for package or bug name: Reporting problems