CVE-2022-44729

NameCVE-2022-44729
DescriptionServer-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16. On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3619-1, ELA-998-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
batik (PTS)jessie, jessie (lts)1.7+dfsg-5+deb8u4fixed
stretch (security)1.8-4+deb9u1vulnerable
stretch (lts), stretch1.8-4+deb9u4fixed
buster (security), buster, buster (lts)1.10-2+deb10u3fixed
bullseye1.12-4+deb11u2fixed
bullseye (security)1.12-4+deb11u1vulnerable
bookworm1.16+dfsg-1+deb12u1fixed
sid, trixie1.18+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
batiksourcejessie1.7+dfsg-5+deb8u4ELA-998-1
batiksourcestretch1.8-4+deb9u4ELA-998-1
batiksourcebuster1.10-2+deb10u3DLA-3619-1
batiksourcebullseye1.12-4+deb11u2
batiksourcebookworm1.16+dfsg-1+deb12u1
batiksource(unstable)1.17+dfsg-1

Notes

https://www.openwall.com/lists/oss-security/2023/08/22/2
https://issues.apache.org/jira/browse/BATIK-1349

Search for package or bug name: Reporting problems