Return-Path: X-Original-To: apmail-xmlgraphics-general-archive@www.apache.org Delivered-To: apmail-xmlgraphics-general-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 620521035F for ; Tue, 17 Mar 2015 09:27:25 +0000 (UTC) Received: (qmail 42960 invoked by uid 500); 17 Mar 2015 09:27:25 -0000 Mailing-List: contact general-help@xmlgraphics.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: general@xmlgraphics.apache.org Delivered-To: mailing list general@xmlgraphics.apache.org Received: (qmail 42929 invoked by uid 99); 17 Mar 2015 09:27:25 -0000 Received: from mail-relay.apache.org (HELO mail-relay.apache.org) (140.211.11.15) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 17 Mar 2015 09:27:25 +0000 Received: from mail-qg0-f50.google.com (mail-qg0-f50.google.com [209.85.192.50]) by mail-relay.apache.org (ASF Mail Server at mail-relay.apache.org) with ESMTPSA id BD0D71A035C; Tue, 17 Mar 2015 09:27:24 +0000 (UTC) Received: by qgh62 with SMTP id 62so2690737qgh.1; Tue, 17 Mar 2015 02:27:23 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.55.31.32 with SMTP id f32mr68818270qkf.41.1426584443382; Tue, 17 Mar 2015 02:27:23 -0700 (PDT) Received: by 10.229.148.1 with HTTP; Tue, 17 Mar 2015 02:27:23 -0700 (PDT) Date: Tue, 17 Mar 2015 10:27:23 +0100 Message-ID: Subject: [CVE-2015-0250] Apache Batik information disclosure vulnerability From: Luis Bernardo To: "security@apache.org" , oss-security@lists.openwall.com, bugtraq@securityfocus.com, =?UTF-8?Q?Nicolas_Gr=C3=A9goire?= , kschaller@ernw.de, batik-users@xmlgraphics.apache.org, batik-dev@xmlgraphics.apache.org, general@xmlgraphics.apache.org Content-Type: multipart/alternative; boundary=001a1147b0dcfd73f80511789208 --001a1147b0dcfd73f80511789208 Content-Type: text/plain; charset=UTF-8 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 CVE-2015-0250: Apache Batik information disclosure vulnerability Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Batik 1.0 - 1.7 Description: Files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server--including confidential or sensitive files--would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack. Mitigation: Users should upgrade to Batik 1.8+ Credit: This issue was independently reported by Nicolas Gregoire of AGARRI (www.agarri.fr) and Kevin Schaller of ERNW (www.ernw.de). References: http://xmlgraphics.apache.org/security.html Luis Bernardo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (Darwin) iQEcBAEBAgAGBQJVB++5AAoJEIIDaYnVa18X7LUH/0c9UNsa27D+lUdH0a+ADqWm molgIssNAw4oUmZSzm4VKRhE3poG+d0WLhL2l5HpSJDBpOXLbE3txlYuiEHWibjf Ho1ImstDLstsF3T933Gad8eseSU2GusFIqWbjnRVxdMwqK+en4EOXfNEFysofls8 zQk//K5s3nDog2YP272IZkQjfkyvwPF3v4pSzVSnIxcod7OffIMpqvQ4lFahq8H6 cG84RhmJTQ2oo4I4v/tb+jELgZSTvN5U+owzQejwuQxYaCgyK18Rzpi3bi5TiEy5 TpH5Bq5jT7cOqG2IUNSE7W1tk1JeNP0iuxBQN+yFZK0YAXpWHP9yXUd2fe1mu3Y= =XBUb -----END PGP SIGNATURE----- --001a1147b0dcfd73f80511789208--