First published: Thu Sep 22 2022(Updated: )
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Batik | =1.14 | |
maven/org.apache.xmlgraphics:batik | >=1.0<1.15 | 1.15 |
redhat/Batik | <1.15 | 1.15 |
debian/batik | <=1.10-2+deb10u1<=1.12-4+deb11u2<=1.12-4+deb11u1 | 1.10-2+deb10u3 1.16+dfsg-1+deb12u1 1.17+dfsg-1 |
ubuntu/batik | <1.10-2~18.04.1 | 1.10-2~18.04.1 |
ubuntu/batik | <1.12-1ubuntu0.1 | 1.12-1ubuntu0.1 |
ubuntu/batik | <1.14-1ubuntu0.2 | 1.14-1ubuntu0.2 |
ubuntu/batik | <1.14-2ubuntu0.1 | 1.14-2ubuntu0.1 |
ubuntu/batik | <1.7.ubuntu-8ubuntu2.14.04.3+ | 1.7.ubuntu-8ubuntu2.14.04.3+ |
ubuntu/batik | <1.8-3ubuntu1+ | 1.8-3ubuntu1+ |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38398 is a Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics.
CVE-2022-38398 allows an attacker to load a URL through the jar protocol in Apache XML Graphics Batik.
CVE-2022-38398 has a severity rating of medium with a score of 5.3.
To fix CVE-2022-38398, update to version 1.15 of Batik for redhat or apply the appropriate remedy for your Ubuntu or Debian distribution.
You can find more information about CVE-2022-38398 at the following references: [link](https://lists.apache.org/thread/712c9xwtmyghyokzrm2ml6sps4xlmbsx), [link](https://launchpad.net/bugs/cve/CVE-2022-38398), [link](https://www.cve.org/CVERecord?id=CVE-2022-38398), [link](https://nvd.nist.gov/vuln/detail/CVE-2022-38398), [link](http://svn.apache.org/viewvc?view=revision&revision=1903462), [link](https://issues.apache.org/jira/browse/BATIK-1331).