Vulnerability Description
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Batik | <= 1.13 |
| Fedoraproject | Fedora | 33 |
| Oracle | Agile Engineering Data Management | 6.2.1.0 |
| Oracle | Banking Apis | 18.3 |
| Oracle | Banking Digital Experience | 18.3 |
| Oracle | Communications Application Session Controller | 3.9m0p3 |
| Oracle | Communications Metasolv Solution | 6.3.0 |
| Oracle | Communications Offline Mediation Controller | 12.0.0.3.0 |
| Oracle | Enterprise Repository | 11.1.1.7.0 |
| Oracle | Flexcube Universal Banking | >= 14.1.0, <= 14.4.0 |
| Oracle | Fusion Middleware Mapviewer | 12.2.1.4.0 |
| Oracle | Instantis Enterprisetrack | 17.1 |
| Oracle | Insurance Policy Administration | >= 11.0, <= 11.3.1 |
| Oracle | Product Lifecycle Analytics | 3.6.1 |
| Oracle | Retail Back Office | 14.1 |
| Oracle | Retail Central Office | 14.1 |
| Oracle | Retail Order Broker | 15.0 |
| Oracle | Retail Order Management System Cloud Service | 19.5 |
| Oracle | Retail Point-Of-Service | 14.1 |
| Oracle | Retail Returns Management | 14.1 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863fMailing ListVendor Advisory
- https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb9970663Mailing ListVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/10/msg00021.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproMailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202401-11Third Party Advisory
- https://www.oracle.com//security-alerts/cpujul2021.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpuApr2021.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpujan2022.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpujul2022.htmlPatchThird Party Advisory
- https://www.oracle.com/security-alerts/cpuoct2021.htmlPatchThird Party Advisory
- https://xmlgraphics.apache.org/security.htmlRelease NotesVendor Advisory
- https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863fMailing ListVendor Advisory
- https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb9970663Mailing ListVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/10/msg00021.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2020-11987?
CVE-2020-11987 is a vulnerability with a CVSS score of 8.2 (HIGH). Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulner...
How severe is CVE-2020-11987?
CVE-2020-11987 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-11987?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Batik, Fedoraproject Fedora, Oracle Agile Engineering Data Management, Oracle Banking Apis, Oracle Banking Digital Experience.