vulnerability
SUSE: CVE-2020-11987: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | 02/24/2021 | 08/09/2024 | 08/09/2024 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
02/24/2021
Added
08/09/2024
Modified
08/09/2024
Description
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Solution(s)
suse-upgrade-xmlgraphics-batiksuse-upgrade-xmlgraphics-batik-csssuse-upgrade-xmlgraphics-batik-demosuse-upgrade-xmlgraphics-batik-javadocsuse-upgrade-xmlgraphics-batik-rasterizersuse-upgrade-xmlgraphics-batik-slideshowsuse-upgrade-xmlgraphics-batik-squigglesuse-upgrade-xmlgraphics-batik-svgppsuse-upgrade-xmlgraphics-batik-ttf2svg

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.