svg-salamander is vulnerable to server side request forgery (SSRF) attacks. The vulnerability exists because svg-salamander does not restrict the schemes supported in the SVG file. An attacker can exploit this vulnerability by supplying a SVG file with file://
, jar://
, or other application specific scheme to conduct the attack.
CPE | Name | Operator | Version |
---|---|---|---|
svg salamander | eq | 0.1.19 | |
svg salamander | eq | 1.0 |
www.debian.org/security/2017/dsa-3781
www.openwall.com/lists/oss-security/2017/01/27/3
www.openwall.com/lists/oss-security/2017/01/29/2
www.securityfocus.com/bid/95871
bugzilla.redhat.com/show_bug.cgi?id=1417567
github.com/blackears/svgSalamander/issues/11
lists.fedoraproject.org/archives/list/[email protected]/message/3V7RIIO3HO4RNDBN2PARLIDAL3RPV2OX/
lists.fedoraproject.org/archives/list/[email protected]/message/UPUOI6NCEB6H6YHKN7M4V3CAQD63NXAU/
security.gentoo.org/glsa/202003-11