Lucene search

K
amazonAmazonALAS-2023-1695
HistoryMar 02, 2023 - 8:21 p.m.

Important: batik

2023-03-0220:21:00
alas.aws.amazon.com
54
batik
ssrf
vulnerability
untrusted
java code
javascript
update

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS

0.013

Percentile

86.1%

Issue Overview:

Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. (CVE-2020-11987)

Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14. (CVE-2022-38398)

Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to fetch external resources. This issue affects Apache XML Graphics Batik 1.14. (CVE-2022-38648)

Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14. (CVE-2022-40146)

A vulnerability in Batik of Apache XML Graphics allows an attacker to run untrusted Java code from an SVG. This issue affects Apache XML Graphics prior to 1.16. It is recommended to update to version 1.16. (CVE-2022-41704)

A vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This issue affects Apache XML Graphics prior to 1.16. Users are recommended to upgrade to version 1.16. (CVE-2022-42890)

Affected Packages:

batik

Issue Correction:
Run yum update batik to update your system.

New Packages:

i686:  
    batik-squiggle-1.7-10.10.amzn1.i686  
    batik-rasterizer-1.7-10.10.amzn1.i686  
    batik-slideshow-1.7-10.10.amzn1.i686  
    batik-svgpp-1.7-10.10.amzn1.i686  
    batik-ttf2svg-1.7-10.10.amzn1.i686  
    batik-demo-1.7-10.10.amzn1.i686  
    batik-1.7-10.10.amzn1.i686  
  
noarch:  
    batik-javadoc-1.7-10.10.amzn1.noarch  
  
src:  
    batik-1.7-10.10.amzn1.src  
  
x86_64:  
    batik-demo-1.7-10.10.amzn1.x86_64  
    batik-squiggle-1.7-10.10.amzn1.x86_64  
    batik-rasterizer-1.7-10.10.amzn1.x86_64  
    batik-svgpp-1.7-10.10.amzn1.x86_64  
    batik-ttf2svg-1.7-10.10.amzn1.x86_64  
    batik-slideshow-1.7-10.10.amzn1.x86_64  
    batik-1.7-10.10.amzn1.x86_64  

Additional References

Red Hat: CVE-2020-11987, CVE-2022-38398, CVE-2022-38648, CVE-2022-40146, CVE-2022-41704, CVE-2022-42890

Mitre: CVE-2020-11987, CVE-2022-38398, CVE-2022-38648, CVE-2022-40146, CVE-2022-41704, CVE-2022-42890

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS

0.013

Percentile

86.1%