First published: Tue Aug 22 2023(Updated: )
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation. By persuading a victim to open specially crafted SVG file, an attacker could exploit this vulnerability to conduct SSRF attack to cause resource consumption and obtain sensitive information.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache XML Graphics Batik | >=1.0<=1.16 | |
maven/org.apache.xmlgraphics:batik-transcoder | >=1.0<1.17 | 1.17 |
maven/org.apache.xmlgraphics:batik-svgrasterizer | >=1.0<1.17 | 1.17 |
maven/org.apache.xmlgraphics:batik-bridge | >=1.0<1.17 | 1.17 |
Debian Debian Linux | =10.0 | |
redhat/batik | <1.17 | 1.17 |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Apache Batik vulnerability is CVE-2022-44729.
The title of this Apache Batik vulnerability is Re: [CVE-2022-44729] Apache Batik information disclosure vulnerability.
The severity of CVE-2022-44729 is high with a CVSS score of 7.1.
Apache XML Graphics Batik version 1.16 is affected by this vulnerability.
To fix CVE-2022-44729, update Apache XML Graphics Batik to version 1.17.