You are viewing a plain text version of this content. The canonical link for it is here.
Posted to batik-dev@xmlgraphics.apache.org by Luis Bernardo <lb...@apache.org> on 2015/03/17 10:27:23 UTC

[CVE-2015-0250] Apache Batik information disclosure vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


CVE-2015-0250:
        Apache Batik information disclosure vulnerability


Severity:
        Medium


Vendor:
        The Apache Software Foundation


Versions Affected:
        Batik 1.0 - 1.7


Description:
        Files lying on the filesystem of the server which uses batik can
        be revealed to arbitrary users who send maliciously formed SVG
        files. The file types that can be shown depend on the user context
        in which the exploitable application is running. If the user is root
        a full compromise of the server--including confidential or sensitive
        files--would be possible.

        XXE can also be used to attack the availability of the server
        via denial of service as the references within a xml document
        can trivially trigger an amplification attack.


Mitigation:
        Users should upgrade to Batik 1.8+


Credit:
        This issue was independently reported by Nicolas Gregoire of AGARRI
        (www.agarri.fr) and Kevin Schaller of ERNW (www.ernw.de).

References:
        http://xmlgraphics.apache.org/security.html

Luis Bernardo

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (Darwin)

iQEcBAEBAgAGBQJVB++5AAoJEIIDaYnVa18X7LUH/0c9UNsa27D+lUdH0a+ADqWm
molgIssNAw4oUmZSzm4VKRhE3poG+d0WLhL2l5HpSJDBpOXLbE3txlYuiEHWibjf
Ho1ImstDLstsF3T933Gad8eseSU2GusFIqWbjnRVxdMwqK+en4EOXfNEFysofls8
zQk//K5s3nDog2YP272IZkQjfkyvwPF3v4pSzVSnIxcod7OffIMpqvQ4lFahq8H6
cG84RhmJTQ2oo4I4v/tb+jELgZSTvN5U+owzQejwuQxYaCgyK18Rzpi3bi5TiEy5
TpH5Bq5jT7cOqG2IUNSE7W1tk1JeNP0iuxBQN+yFZK0YAXpWHP9yXUd2fe1mu3Y=
=XBUb
-----END PGP SIGNATURE-----

Re: [CVE-2015-0250] Apache Batik information disclosure vulnerability

Posted by Mark Mynsted <mm...@verizon.net>.
Any idea when the maven repositories will get updated with 1.8?

> On Mar 17, 2015, at 4:27 AM, Luis Bernardo <lb...@apache.org> wrote:
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> 
> CVE-2015-0250:
>         Apache Batik information disclosure vulnerability
> 
> 
> Severity:
>         Medium
> 
> 
> Vendor:
>         The Apache Software Foundation
> 
> 
> Versions Affected:
>         Batik 1.0 - 1.7
> 
> 
> Description:
>         Files lying on the filesystem of the server which uses batik can
>         be revealed to arbitrary users who send maliciously formed SVG
>         files. The file types that can be shown depend on the user context
>         in which the exploitable application is running. If the user is root
>         a full compromise of the server--including confidential or sensitive
>         files--would be possible.
> 
>         XXE can also be used to attack the availability of the server
>         via denial of service as the references within a xml document
>         can trivially trigger an amplification attack.
> 
> 
> Mitigation:
>         Users should upgrade to Batik 1.8+
> 
> 
> Credit:
>         This issue was independently reported by Nicolas Gregoire of AGARRI
>         (www.agarri.fr) and Kevin Schaller of ERNW (www.ernw.de).
> 
> References:
>         http://xmlgraphics.apache.org/security.html
> 
> Luis Bernardo
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (Darwin)
> 
> iQEcBAEBAgAGBQJVB++5AAoJEIIDaYnVa18X7LUH/0c9UNsa27D+lUdH0a+ADqWm
> molgIssNAw4oUmZSzm4VKRhE3poG+d0WLhL2l5HpSJDBpOXLbE3txlYuiEHWibjf
> Ho1ImstDLstsF3T933Gad8eseSU2GusFIqWbjnRVxdMwqK+en4EOXfNEFysofls8
> zQk//K5s3nDog2YP272IZkQjfkyvwPF3v4pSzVSnIxcod7OffIMpqvQ4lFahq8H6
> cG84RhmJTQ2oo4I4v/tb+jELgZSTvN5U+owzQejwuQxYaCgyK18Rzpi3bi5TiEy5
> TpH5Bq5jT7cOqG2IUNSE7W1tk1JeNP0iuxBQN+yFZK0YAXpWHP9yXUd2fe1mu3Y=
> =XBUb
> -----END PGP SIGNATURE-----
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: batik-users-unsubscribe@xmlgraphics.apache.org
For additional commands, e-mail: batik-users-help@xmlgraphics.apache.org