CVE-2020-11988

EUVD-2022-0985
Apache XmlGraphics Commons 2.4 and earlier is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. Users should upgrade to 2.6 or later.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.2 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 47%
Affected Products (NVD)
VendorProductVersion
apachexmlgraphics_commons
𝑥
≤ 2.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xmlgraphics-commons
bookworm
2.8-2
fixed
bullseye
2.4-2~deb11u1
fixed
bullseye (security)
2.4-2~deb11u1
fixed
sid
2.10-1
fixed
stretch
not-affected
trixie
2.10-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xmlgraphics-commons
bionic
needs-triage
focal
needs-triage
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
dne
xenial
needs-triage
References