CVE-2020-11987
Published on: 02/24/2021 12:00:00 AM UTC
Last Modified on: 07/25/2022 07:09:11 PM UTC
Certain versions of Batik from Apache contain the following vulnerability:
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
- CVE-2020-11987 has been assigned by
secu[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 8.2 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | LOW | NONE |
CVSS2 Score: 6.4 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Oracle Critical Patch Update Advisory - July 2021 | www.oracle.com text/html |
![]() |
Pony Mail! | Mailing List Vendor Advisory lists.apache.org text/html |
![]() |
Oracle Critical Patch Update Advisory - October 2021 | www.oracle.com text/html |
![]() |
Oracle Critical Patch Update Advisory - January 2022 | www.oracle.com text/html |
![]() |
[SECURITY] Fedora 34 Update: batik-1.14-1.fc34 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
[SECURITY] Fedora 33 Update: batik-1.14-2.fc33 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
Pony Mail! | Mailing List Vendor Advisory lists.apache.org text/html |
![]() |
The Apache(tm) XML Graphics Project - Community | Release Notes Vendor Advisory xmlgraphics.apache.org text/html |
![]() |
Oracle Critical Patch Update Advisory - July 2022 | www.oracle.com text/html |
![]() |
Oracle Critical Patch Update Advisory - April 2021 | www.oracle.com text/html |
![]() |
Related QID Numbers
- 199377 Ubuntu Security Notification for Apache Batik Vulnerabilities (USN-6117-1)
- 281350 Fedora Security Update for batik (FEDORA-2021-33a1b73e48)
- 281522 Fedora Security Update for batik (FEDORA-2021-65ff5f10e2)
- 354806 Amazon Linux Security Advisory for batik : ALAS2-2023-1966
- 354807 Amazon Linux Security Advisory for batik : ALAS-2023-1695
- 355063 Amazon Linux Security Advisory for batik : AL2012-2023-387
- 87496 Oracle WebLogic Server Multiple Vulnerabilities (CPUJUL2022)
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:apache:batik:1.13:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:batik:1.13:*:*:*:*:*:*:*:
- cpe:2.3:a:apache:batik:*:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_apis:18.3:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_apis:19.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_apis:19.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_apis:20.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_apis:21.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:banking_digital_experience:21.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_application_session_controller:3.9m0p3:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_metasolv_solution:6.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_repository:11.1.1.7.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:insurance_policy_administration:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_central_officeretail_back_office:14.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_order_management_system_cloud_service:19.5:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|