First published: Tue Apr 18 2017(Updated: )
In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Batik | <=1.8 | |
debian/batik | 1.10-2+deb10u1 1.10-2+deb10u3 1.12-4+deb11u2 1.12-4+deb11u1 1.16+dfsg-1+deb12u1 1.17+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5662 has a moderate severity rating due to its ability to expose sensitive files on the server to unauthorized users.
To remediate CVE-2017-5662, upgrade Apache Batik to version 1.9 or later to mitigate the vulnerability.
The types of files that can be revealed through CVE-2017-5662 depend on the permissions of the user context running the vulnerable application.
All versions of Apache Batik before 1.9 are vulnerable to CVE-2017-5662.
Yes, CVE-2017-5662 can be exploited by sending specially crafted SVG files to the affected application.