CVE-2019-17566

NameCVE-2019-17566
DescriptionApache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesELA-237-1
Debian Bugs964510

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
batik (PTS)jessie, jessie (lts)1.7+dfsg-5+deb8u4fixed
stretch (security)1.8-4+deb9u1vulnerable
stretch (lts), stretch1.8-4+deb9u4fixed
buster (security), buster, buster (lts)1.10-2+deb10u3fixed
bullseye1.12-4+deb11u2fixed
bullseye (security)1.12-4+deb11u1fixed
bookworm1.16+dfsg-1+deb12u1fixed
sid, trixie1.18+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
batiksourcejessie1.7+dfsg-5+deb8u2ELA-237-1
batiksourcestretch1.8-4+deb9u2
batiksourcebuster1.10-2+deb10u1
batiksource(unstable)1.12-1.1964510

Notes

https://www.openwall.com/lists/oss-security/2020/06/15/2
patch: http://svn.apache.org/viewvc?view=revision&revision=1871084
corresponding bug: https://issues.apache.org/jira/browse/BATIK-1276
[wheezy] - batik <no-dsa> (Would need rdep changes, can break some uses)

Search for package or bug name: Reporting problems