Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "33"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "34"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "20.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "21.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "20.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "21.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.9m0p3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.0.0.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.1.1.7.0"
}
]
},
{
"events": [
{
"introduced": "14.1.0"
},
{
"last_affected": "14.4.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.2.1.4.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.3"
}
]
},
{
"events": [
{
"introduced": "11.0"
},
{
"last_affected": "11.3.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.6.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.2.1.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.2.1.4.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.1.1.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11987.json"