Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.
On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
CVE-2022-44729 - High Severity Vulnerability
batik-bridge-1.9.jar
Path to dependency file: /Test_2/fs-agent-master/fs-agent-master/pom.xml
Path to vulnerable library: /root/.m2/repository/org/apache/xmlgraphics/batik-bridge/1.9/batik-bridge-1.9.jar
Dependency Hierarchy: - whitesource-analysis-via-18.12.1.204.jar (Root Library) - graphviz-java-0.2.3.jar - batik-codec-1.9.jar - :x: **batik-bridge-1.9.jar** (Vulnerable Library)
batik-svgrasterizer-1.9.jar
Path to dependency file: /Test_2/fs-agent-master/fs-agent-master/pom.xml
Path to vulnerable library: /root/.m2/repository/org/apache/xmlgraphics/batik-svgrasterizer/1.9/batik-svgrasterizer-1.9.jar
Dependency Hierarchy: - whitesource-analysis-via-18.12.1.204.jar (Root Library) - graphviz-java-0.2.3.jar - batik-rasterizer-1.9.jar - :x: **batik-svgrasterizer-1.9.jar** (Vulnerable Library)
batik-transcoder-1.9.jar
Path to dependency file: /Test_2/fs-agent-master/fs-agent-master/pom.xml
Path to vulnerable library: /root/.m2/repository/org/apache/xmlgraphics/batik-transcoder/1.9/batik-transcoder-1.9.jar
Dependency Hierarchy: - whitesource-analysis-via-18.12.1.204.jar (Root Library) - graphviz-java-0.2.3.jar - batik-codec-1.9.jar - :x: **batik-transcoder-1.9.jar** (Vulnerable Library)
Found in HEAD commit: 496ee93a49670cf2906171c7293cf9b50cc09d47
Found in base branch: master
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16. On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.
Publish Date: 2023-08-22
URL: CVE-2022-44729
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://www.openwall.com/lists/oss-security/2023/08/22/2
Release Date: 2023-08-22
Fix Resolution: org.apache.xmlgraphics:batik-bridge:1.17;org.apache.xmlgraphics:batik-all:1.17;org.apache.xmlgraphics:batik-svgrasterizer:1.17;org.apache.xmlgraphics:batik-rasterizer:1.17;org.apache.xmlgraphics:batik-transcoder:1.17
Step up your Open Source Security Game with Mend here