7.5
CVE-2019-17566
- EPSS 0.82%
- Published 12.11.2020 18:15:12
- Last modified 21.11.2024 04:32:32
- Source security@apache.org
- Teams watchlist Login
- Open Login
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Data is provided by the National Vulnerability Database (NVD)
Oracle ≫ Api Gateway Version11.1.2.4.0
Oracle ≫ Business Intelligence Version5.5.0.0.0 SwEditionenterprise
Oracle ≫ Business Intelligence Version5.9.0.0.0 SwEditionenterprise
Oracle ≫ Business Intelligence Version12.2.1.3.0 SwEditionenterprise
Oracle ≫ Business Intelligence Version12.2.1.4.0 SwEditionenterprise
Oracle ≫ Communications Application Session Controller Version3.9m0p2
Oracle ≫ Communications Metasolv Solution Version >= 6.3.0 <= 6.3.1
Oracle ≫ Communications Offline Mediation Controller Version12.0.0.3.0
Oracle ≫ Enterprise Repository Version11.1.1.7.0
Oracle ≫ Financial Services Analytical Applications Infrastructure Version >= 8.0.6 <= 8.1.0
Oracle ≫ Fusion Middleware Mapviewer Version12.2.1.4.0
Oracle ≫ Hospitality Opera 5 Version5.5
Oracle ≫ Hospitality Opera 5 Version5.6
Oracle ≫ Hyperion Financial Reporting Version11.1.2.4
Oracle ≫ Hyperion Financial Reporting Version11.2.5.0
Oracle ≫ Instantis Enterprisetrack Version >= 17.1 <= 17.3
Oracle ≫ Jd Edwards Enterpriseone Tools Version < 9.2.4.0
Oracle ≫ Jd Edwards Enterpriseone Tools Version9.2.4.2
Oracle ≫ Retail Integration Bus Version15.0.3
Oracle ≫ Retail Order Broker Version15.0
Oracle ≫ Retail Order Broker Version16.0
Oracle ≫ Retail Order Management System Cloud Service Version19.5
Oracle ≫ Retail Point-of-service Version14.1
Oracle ≫ Retail Returns Management Version14.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.82% | 0.733 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
CWE-918 Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.