First published: Wed Feb 24 2021(Updated: )
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Batik | <=1.13 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Oracle Banking Apis | =18.3 | |
Oracle Banking Apis | =19.1 | |
Oracle Banking Apis | =19.2 | |
Oracle Banking Apis | =20.1 | |
Oracle Banking Apis | =21.1 | |
Oracle Banking Digital Experience | =18.3 | |
Oracle Banking Digital Experience | =19.1 | |
Oracle Banking Digital Experience | =19.2 | |
Oracle Banking Digital Experience | =20.1 | |
Oracle Banking Digital Experience | =21.1 | |
Oracle Communications Application Session Controller | =3.9m0p3 | |
Oracle Communications Metasolv Solution | =6.3.0 | |
Oracle Communications Metasolv Solution | =6.3.1 | |
Oracle Communications Offline Mediation Controller | =12.0.0.3.0 | |
Oracle Enterprise Repository | =11.1.1.7.0 | |
Oracle FLEXCUBE Universal Banking | >=14.1.0<=14.4.0 | |
Oracle Fusion Middleware MapViewer | =12.2.1.4.0 | |
Oracle Instantis Enterprisetrack | =17.1 | |
Oracle Instantis Enterprisetrack | =17.2 | |
Oracle Instantis Enterprisetrack | =17.3 | |
Oracle Insurance Policy Administration | >=11.0<=11.3.1 | |
Oracle Retail Back Office | =14.1 | |
Oracle Retail Central Office | =14.1 | |
Oracle Retail Order Broker | =15.0 | |
Oracle Retail Order Broker | =16.0 | |
Oracle Retail Order Management System Cloud Service | =19.5 | |
Oracle Retail Point-of-Service | =14.1 | |
Oracle Retail Returns Management | =14.1 | |
maven/org.apache.xmlgraphics:batik-svgbrowser | <1.14 | 1.14 |
debian/batik | <=1.10-2+deb10u1<=1.12-4+deb11u2<=1.12-4+deb11u1 | 1.10-2+deb10u3 1.16+dfsg-1+deb12u1 1.17+dfsg-1 |
ubuntu/batik | <1.10-2~18.04.1 | 1.10-2~18.04.1 |
ubuntu/batik | <1.12-1ubuntu0.1 | 1.12-1ubuntu0.1 |
ubuntu/batik | <1.8-3ubuntu1+ | 1.8-3ubuntu1+ |
ubuntu/batik | <1.7.ubuntu-8ubuntu2.14.04.3+ | 1.7.ubuntu-8ubuntu2.14.04.3+ |
redhat/batik | <1.14 | 1.14 |
Oracle Agile Engineering Data Management | =6.2.1.0 | |
Oracle Product Lifecycle Analytics | =3.6.1 | |
Oracle WebLogic Server | =12.2.1.3.0 | |
Oracle WebLogic Server | =12.2.1.4.0 | |
Oracle WebLogic Server | =14.1.1.0.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-11987.
The severity level of CVE-2020-11987 is high (8.2).
The affected software for CVE-2020-11987 includes Apache Batik versions 1.7.ubuntu-8ubuntu2.14.04.3+, 1.8-3ubuntu1+, 1.10-2~18.04.1, 1.12-1ubuntu0.1, 1.14, 1.16+dfsg-1, 1.17+dfsg-1, and org.apache.xmlgraphics:batik-svgbrowser version 1.14.
CVE-2020-11987 is a server-side request forgery vulnerability in Apache Batik 1.13, caused by improper input validation by the NodePickerPanel. It allows an attacker to exploit the vulnerability and cause the underlying server to make arbitrary GET requests.
To fix CVE-2020-11987, it is recommended to update to the patched versions of Apache Batik (1.10-2~18.04.1, 1.12-1ubuntu0.1) or apply the necessary security updates provided by the respective software vendors.