You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Apache XML Graphics Commons is a library that consists of several reusable
components used by Apache Batik and Apache FOP. Many of these components
can easily be used separately outside the domains of SVG and XSL-FO.
Path to vulnerable library: /adit-war/lib/xmlgraphics-commons-1.4.jar
Apache XML Graphics Commons is a library that consists of several reusable
components used by Apache Batik and Apache FOP. Many of these components
can easily be used separately outside the domains of SVG and XSL-FO.
Path to vulnerable library: /adit-war/lib/xmlgraphics-commons-1.4.jar
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
Vulnerable Library - xmlgraphics-commons-1.4.jar
Apache XML Graphics Commons is a library that consists of several reusable components used by Apache Batik and Apache FOP. Many of these components can easily be used separately outside the domains of SVG and XSL-FO.
Path to vulnerable library: /adit-war/lib/xmlgraphics-commons-1.4.jar
Vulnerabilities
Details
CVE-2020-11988
Vulnerable Library - xmlgraphics-commons-1.4.jar
Apache XML Graphics Commons is a library that consists of several reusable components used by Apache Batik and Apache FOP. Many of these components can easily be used separately outside the domains of SVG and XSL-FO.
Path to vulnerable library: /adit-war/lib/xmlgraphics-commons-1.4.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
Publish Date: 2021-02-24
URL: CVE-2020-11988
CVSS 3 Score Details (8.2)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://xmlgraphics.apache.org/security.html
Release Date: 2021-02-24
Fix Resolution: 2.6
The text was updated successfully, but these errors were encountered: