{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-42890","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","dateUpdated":"2024-08-03T13:19:05.216Z","dateReserved":"2022-10-12T00:00:00.000Z","datePublished":"2022-10-25T00:00:00.000Z"},"containers":{"cna":{"title":"Apache Batik prior to 1.16 allows RCE via scripting","providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2024-01-07T11:06:20.509Z"},"descriptions":[{"lang":"en","value":"A vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This issue affects Apache XML Graphics prior to 1.16. Users are recommended to upgrade to version 1.16."}],"affected":[{"vendor":"Apache Software Foundation","product":"Apache XML Graphics","versions":[{"version":"Batik","status":"affected","lessThanOrEqual":"1.15","versionType":"custom"}]}],"references":[{"url":"https://lists.apache.org/thread/pkvhy0nsj1h1mlon008wtzhosbtxjwly"},{"name":"[oss-security] 20221025 [CVE-2022-42890] Apache Batik information disclosure vulnerability","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/10/25/3"},{"name":"[debian-lts-announce] 20221029 [SECURITY] [DLA 3169-1] batik security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00038.html"},{"name":"DSA-5264","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5264"},{"name":"GLSA-202401-11","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202401-11"}],"credits":[{"lang":"en","value":"This issue was independently reported by Y4tacker and 4ra1n of Chaitin Tech"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Remote code execution via batik scripting"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T13:19:05.216Z"},"title":"CVE Program Container","references":[{"url":"https://lists.apache.org/thread/pkvhy0nsj1h1mlon008wtzhosbtxjwly","tags":["x_transferred"]},{"name":"[oss-security] 20221025 [CVE-2022-42890] Apache Batik information disclosure vulnerability","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/10/25/3"},{"name":"[debian-lts-announce] 20221029 [SECURITY] [DLA 3169-1] batik security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00038.html"},{"name":"DSA-5264","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5264"},{"name":"GLSA-202401-11","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202401-11"}]}]}}