7.5
CWE
352 20 918
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2019-17566: CSRF

First published: Mon Jun 15 2020(Updated: )

Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

Credit: security@apache.org security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
maven/org.apache.xmlgraphics:batik<1.13
1.13
Apache Batik<1.13
Oracle API Gateway=11.1.2.4.0
Oracle Business Intelligence=5.5.0.0.0
Oracle Business Intelligence=5.9.0.0.0
Oracle Business Intelligence=12.2.1.3.0
Oracle Business Intelligence=12.2.1.4.0
Oracle Communications Application Session Controller=3.9m0p2
Oracle Communications Metasolv Solution>=6.3.0<=6.3.1
Oracle Communications Offline Mediation Controller=12.0.0.3.0
Oracle Enterprise Repository=11.1.1.7.0
Oracle Financial Services Analytical Applications Infrastructure>=8.0.6<=8.1.0
Oracle Fusion Middleware MapViewer=12.2.1.4.0
Oracle Hospitality Opera 5=5.5
Oracle Hospitality Opera 5=5.6
Oracle Hyperion Financial Reporting=11.1.2.4
Oracle Hyperion Financial Reporting=11.2.5.0
Oracle Instantis Enterprisetrack>=17.1<=17.3
Oracle Jd Edwards Enterpriseone Tools<9.2.4.0
Oracle Jd Edwards Enterpriseone Tools=9.2.4.2
Oracle Retail Integration Bus=15.0.3
Oracle Retail Order Broker=15.0
Oracle Retail Order Broker=16.0
Oracle Retail Order Management System Cloud Service=19.5
Oracle Retail Point-of-Service=14.1
Oracle Retail Returns Management=14.1
redhat/batik<1.13
1.13
debian/batik
1.10-2+deb10u1
1.10-2+deb10u3
1.12-4+deb11u2
1.12-4+deb11u1
1.16+dfsg-1+deb12u1
1.17+dfsg-1
ubuntu/batik<1.10-2~18.04.1
1.10-2~18.04.1
ubuntu/batik<1.12-1ubuntu0.1
1.12-1ubuntu0.1
ubuntu/batik<1.7.ubuntu-8ubuntu2.14.04.3+
1.7.ubuntu-8ubuntu2.14.04.3+
ubuntu/batik<1.8-3ubuntu1+
1.8-3ubuntu1+

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2019-17566?

    CVE-2019-17566 is a vulnerability in the Apache Batik library that allows for server-side request forgery (SSRF) attacks.

  • How does CVE-2019-17566 affect systems?

    CVE-2019-17566 can lead to system integrity compromise by allowing attackers to make arbitrary GET requests on the underlying server.

  • What is the severity of CVE-2019-17566?

    CVE-2019-17566 has a high severity rating, with a severity value of 7.

  • Which software versions are affected by CVE-2019-17566?

    Versions 1.10-2~18.04.1, 1.12-1ubuntu0.1, 1.7.ubuntu-8ubuntu2.14.04.3+, and 1.8-3ubuntu1+ of the Batik library on Ubuntu are affected by CVE-2019-17566.

  • How can CVE-2019-17566 be fixed?

    To fix CVE-2019-17566, update the Batik library to version 1.10-2~18.04.1, 1.12-1ubuntu0.1, 1.7.ubuntu-8ubuntu2.14.04.3+, or 1.8-3ubuntu1+ depending on the Ubuntu version.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203