First published: Wed Feb 24 2021(Updated: )
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xmlgraphics-commons | <2.6 | 2.6 |
Apache XmlGraphics Commons | <=2.4 | |
Fedora | =33 | |
Fedora | =34 |
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-11988 is classified as a high severity vulnerability due to its potential for server-side request forgery.
To fix CVE-2020-11988, upgrade to Apache XmlGraphics Commons version 2.6 or later.
CVE-2020-11988 affects Apache XmlGraphics Commons versions 2.4 and earlier, as well as certain Fedora releases.
CVE-2020-11988 is a server-side request forgery (SSRF) vulnerability caused by improper input validation.
Yes, exploiting CVE-2020-11988 can allow an attacker to make arbitrary GET requests, potentially leading to data exposure.