First published: Tue Aug 22 2023(Updated: )
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation. By persuading a victim to open specially crafted SVG file, an attacker could exploit this vulnerability to conduct SSRF attack to probe user profile/data and send it directly as parameter to a URL.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache XML Graphics Batik | >=1.0<=1.16 | |
maven/org.apache.xmlgraphics:batik-script | >=1.0<1.17 | 1.17 |
Debian Debian Linux | =10.0 | |
redhat/batik | <1.17 | 1.17 |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-44730 is medium.
The affected software for CVE-2022-44730 is Apache XML Graphics Batik version 1.16.
To fix CVE-2022-44730, upgrade to Apache XML Graphics Batik version 1.17.
The CWE ID for CVE-2022-44730 is 918.
You can find more information about CVE-2022-44730 on the NIST National Vulnerability Database (NVD) website and the Apache XML Graphics Batik security page.