The Apache Batik library is vulnerable to SSRF via "xlink:href" attributes that allow an attacker to cause the underlying server to make arbitrary GET requests. References: https://www.openwall.com/lists/oss-security/2020/06/15/2
Created batik tracking bugs for this issue: Affects: fedora-all [bug 1848619]
Upstream Issue: https://issues.apache.org/jira/projects/BATIK/issues/BATIK-1276 Fixing Commit: bc6078ca949039e2076cd08b4cb169c84c1179b1 (https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1) Affects GAVs: org.apache.xmlgraphics:batik-transcoder org.apache.xmlgraphics:batik-svgrasterizer org.apache.xmlgraphics:batik-all
This issue has been addressed in the following products: RHDM 7.9.0 Via RHSA-2020:4960 https://access.redhat.com/errata/RHSA-2020:4960
This issue has been addressed in the following products: RHPAM 7.9.0 Via RHSA-2020:4961 https://access.redhat.com/errata/RHSA-2020:4961
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-17566
This issue has been addressed in the following products: Red Hat Fuse 7.8.0 Via RHSA-2020:5568 https://access.redhat.com/errata/RHSA-2020:5568