CVE-2019-17566

Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
SSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
apacheCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 77%
VendorProductVersion
apachebatik
𝑥
< 1.13
oracleapi_gateway
11.1.2.4.0
oraclebusiness_intelligence
5.5.0.0.0
oraclebusiness_intelligence
5.9.0.0.0
oraclebusiness_intelligence
12.2.1.3.0
oraclebusiness_intelligence
12.2.1.4.0
oraclecommunications_application_session_controller
3.9m0p2:m0p2
oraclecommunications_metasolv_solution
6.3.0 ≤
𝑥
≤ 6.3.1
oraclecommunications_offline_mediation_controller
12.0.0.3.0
oracleenterprise_repository
11.1.1.7.0
oraclefinancial_services_analytical_applications_infrastructure
8.0.6 ≤
𝑥
≤ 8.1.0
oraclefusion_middleware_mapviewer
12.2.1.4.0
oraclehospitality_opera_5
5.5
oraclehospitality_opera_5
5.6
oraclehyperion_financial_reporting
11.1.2.4
oraclehyperion_financial_reporting
11.2.5.0
oracleinstantis_enterprisetrack
17.1 ≤
𝑥
≤ 17.3
oraclejd_edwards_enterpriseone_tools
𝑥
< 9.2.4.0
oraclejd_edwards_enterpriseone_tools
9.2.4.2
oracleretail_integration_bus
15.0.3
oracleretail_order_broker
15.0
oracleretail_order_broker
16.0
oracleretail_order_management_system_cloud_service
19.5
oracleretail_point-of-service
14.1
oracleretail_returns_management
14.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
batik
bullseye
1.12-4+deb11u2
fixed
bullseye (security)
1.12-4+deb11u1
fixed
bookworm
1.16+dfsg-1+deb12u1
fixed
sid
1.18+dfsg-2
fixed
trixie
1.18+dfsg-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
batik
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
Fixed 1.12-1ubuntu0.1
released
eoan
ignored
bionic
Fixed 1.10-2~18.04.1
released
xenial
Fixed 1.8-3ubuntu1+esm1
released
trusty
Fixed 1.7.ubuntu-8ubuntu2.14.04.3+esm1
released