8.2
CWE
20 918
Advisory Published
Advisory Published
Updated

CVE-2020-11987: Input Validation

First published: Wed Feb 24 2021(Updated: )

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.

Credit: security@apache.org security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
Apache Batik<=1.13
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Oracle Banking Apis=18.3
Oracle Banking Apis=19.1
Oracle Banking Apis=19.2
Oracle Banking Apis=20.1
Oracle Banking Apis=21.1
Oracle Banking Digital Experience=18.3
Oracle Banking Digital Experience=19.1
Oracle Banking Digital Experience=19.2
Oracle Banking Digital Experience=20.1
Oracle Banking Digital Experience=21.1
Oracle Communications Application Session Controller=3.9m0p3
Oracle Communications Metasolv Solution=6.3.0
Oracle Communications Metasolv Solution=6.3.1
Oracle Communications Offline Mediation Controller=12.0.0.3.0
Oracle Enterprise Repository=11.1.1.7.0
Oracle FLEXCUBE Universal Banking>=14.1.0<=14.4.0
Oracle Fusion Middleware MapViewer=12.2.1.4.0
Oracle Instantis Enterprisetrack=17.1
Oracle Instantis Enterprisetrack=17.2
Oracle Instantis Enterprisetrack=17.3
Oracle Insurance Policy Administration>=11.0<=11.3.1
Oracle Retail Back Office=14.1
Oracle Retail Central Office=14.1
Oracle Retail Order Broker=15.0
Oracle Retail Order Broker=16.0
Oracle Retail Order Management System Cloud Service=19.5
Oracle Retail Point-of-Service=14.1
Oracle Retail Returns Management=14.1
maven/org.apache.xmlgraphics:batik-svgbrowser<1.14
1.14
debian/batik<=1.10-2+deb10u1<=1.12-4+deb11u2<=1.12-4+deb11u1
1.10-2+deb10u3
1.16+dfsg-1+deb12u1
1.17+dfsg-1
ubuntu/batik<1.10-2~18.04.1
1.10-2~18.04.1
ubuntu/batik<1.12-1ubuntu0.1
1.12-1ubuntu0.1
ubuntu/batik<1.8-3ubuntu1+
1.8-3ubuntu1+
ubuntu/batik<1.7.ubuntu-8ubuntu2.14.04.3+
1.7.ubuntu-8ubuntu2.14.04.3+
redhat/batik<1.14
1.14
Oracle Agile Engineering Data Management=6.2.1.0
Oracle Product Lifecycle Analytics=3.6.1
Oracle WebLogic Server=12.2.1.3.0
Oracle WebLogic Server=12.2.1.4.0
Oracle WebLogic Server=14.1.1.0.0
Debian Debian Linux=10.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2020-11987.

  • What is the severity level of CVE-2020-11987?

    The severity level of CVE-2020-11987 is high (8.2).

  • What is the affected software for CVE-2020-11987?

    The affected software for CVE-2020-11987 includes Apache Batik versions 1.7.ubuntu-8ubuntu2.14.04.3+, 1.8-3ubuntu1+, 1.10-2~18.04.1, 1.12-1ubuntu0.1, 1.14, 1.16+dfsg-1, 1.17+dfsg-1, and org.apache.xmlgraphics:batik-svgbrowser version 1.14.

  • What is the vulnerability description for CVE-2020-11987?

    CVE-2020-11987 is a server-side request forgery vulnerability in Apache Batik 1.13, caused by improper input validation by the NodePickerPanel. It allows an attacker to exploit the vulnerability and cause the underlying server to make arbitrary GET requests.

  • How can I fix CVE-2020-11987?

    To fix CVE-2020-11987, it is recommended to update to the patched versions of Apache Batik (1.10-2~18.04.1, 1.12-1ubuntu0.1) or apply the necessary security updates provided by the respective software vendors.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203