{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-44729","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2022-11-04T09:23:15.973Z","datePublished":"2023-08-22T14:12:50.301Z","dateUpdated":"2025-02-13T16:33:42.214Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache XML Graphics Batik","vendor":"Apache Software Foundation","versions":[{"status":"affected","version":"1.16"}]}],"credits":[{"lang":"en","type":"finder","value":"nbxiglk"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.<p>This issue affects Apache XML Graphics Batik: 1.16.</p><p>On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.<br></p>"}],"value":"Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.\n\nOn version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later."}],"metrics":[{"other":{"content":{"text":"moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-918","description":"CWE-918 Server-Side Request Forgery (SSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2024-01-07T11:06:27.331Z"},"references":[{"url":"https://xmlgraphics.apache.org/security.html"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2"},{"url":"http://www.openwall.com/lists/oss-security/2023/08/22/2"},{"url":"http://www.openwall.com/lists/oss-security/2023/08/22/4"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html"},{"url":"https://security.gentoo.org/glsa/202401-11"}],"source":{"defect":["BATIK-1349"],"discovery":"UNKNOWN"},"title":"Apache XML Graphics Batik: Information disclosure vulnerability","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T14:01:31.175Z"},"title":"CVE Program Container","references":[{"url":"https://xmlgraphics.apache.org/security.html","tags":["x_transferred"]},{"tags":["vendor-advisory","x_transferred"],"url":"https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2"},{"url":"http://www.openwall.com/lists/oss-security/2023/08/22/2","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2023/08/22/4","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html","tags":["x_transferred"]},{"url":"https://security.gentoo.org/glsa/202401-11","tags":["x_transferred"]}]}]}}