Lucene search

K
amazonAmazonALAS-2023-1695
HistoryMar 02, 2023 - 8:21 p.m.

Important: batik

2023-03-0220:21:00
alas.aws.amazon.com
40

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.009 Low

EPSS

Percentile

83.0%

Issue Overview:

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. (CVE-2020-11987)

Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14. (CVE-2022-38398)

Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to fetch external resources. This issue affects Apache XML Graphics Batik 1.14. (CVE-2022-38648)

Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14. (CVE-2022-40146)

A vulnerability in Batik of Apache XML Graphics allows an attacker to run untrusted Java code from an SVG. This issue affects Apache XML Graphics prior to 1.16. It is recommended to update to version 1.16. (CVE-2022-41704)

A vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This issue affects Apache XML Graphics prior to 1.16. Users are recommended to upgrade to version 1.16. (CVE-2022-42890)

Affected Packages:

batik

Issue Correction:
Run yum update batik to update your system.

New Packages:

i686:  
    batik-squiggle-1.7-10.10.amzn1.i686  
    batik-rasterizer-1.7-10.10.amzn1.i686  
    batik-slideshow-1.7-10.10.amzn1.i686  
    batik-svgpp-1.7-10.10.amzn1.i686  
    batik-ttf2svg-1.7-10.10.amzn1.i686  
    batik-demo-1.7-10.10.amzn1.i686  
    batik-1.7-10.10.amzn1.i686  
  
noarch:  
    batik-javadoc-1.7-10.10.amzn1.noarch  
  
src:  
    batik-1.7-10.10.amzn1.src  
  
x86_64:  
    batik-demo-1.7-10.10.amzn1.x86_64  
    batik-squiggle-1.7-10.10.amzn1.x86_64  
    batik-rasterizer-1.7-10.10.amzn1.x86_64  
    batik-svgpp-1.7-10.10.amzn1.x86_64  
    batik-ttf2svg-1.7-10.10.amzn1.x86_64  
    batik-slideshow-1.7-10.10.amzn1.x86_64  
    batik-1.7-10.10.amzn1.x86_64  

Additional References

Red Hat: CVE-2020-11987, CVE-2022-38398, CVE-2022-38648, CVE-2022-40146, CVE-2022-41704, CVE-2022-42890

Mitre: CVE-2020-11987, CVE-2022-38398, CVE-2022-38648, CVE-2022-40146, CVE-2022-41704, CVE-2022-42890

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.009 Low

EPSS

Percentile

83.0%