{"id":"CVE-2020-11987","details":"Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.","aliases":["GHSA-2h63-qp69-fwvw"],"modified":"2026-04-16T00:06:45.927872491Z","published":"2021-02-24T18:15:11.093Z","related":["SUSE-SU-2024:0777-1","openSUSE-SU-2024:12402-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.2.1.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_apis:18.3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"18.3"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_apis:19.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"19.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_apis:19.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"19.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_apis:20.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"20.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_apis:21.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"21.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"18.3"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"19.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"19.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"20.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:banking_digital_experience:21.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"21.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:communications_application_session_controller:3.9m0p3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"3.9m0p3"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:communications_metasolv_solution:6.3.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.3.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"6.3.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"12.0.0.3.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:enterprise_repository:11.1.1.7.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"11.1.1.7.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"14.1.0"},{"last_affected":"14.4.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"12.2.1.4.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"17.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"17.2"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"17.3"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:insurance_policy_administration:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"11.0"},{"last_affected":"11.3.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:product_lifecycle_analytics:3.6.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"3.6.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"14.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"14.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"15.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"16.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:retail_order_management_system_cloud_service:19.5:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"19.5"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"14.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"14.1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"12.2.1.3.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"12.2.1.4.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"14.1.1.0.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"10.0"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"33"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"34"}],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00006.html"},{"type":"ADVISORY","url":"https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2%40%3Cdev.poi.apache.org%3E"},{"type":"ADVISORY","url":"https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05%40%3Cdev.poi.apache.org%3E"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00021.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEDID4DAVPECE6O4QQCSIS75BLLBUUAM/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7EAYO5XIHD6OIEA3HPK64UDDBSLNAC5/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-11"},{"type":"ADVISORY","url":"https://xmlgraphics.apache.org/security.html"},{"type":"FIX","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/xmlgraphics-batik","events":[{"introduced":"0"},{"last_affected":"4324d8c3cc133c2df0e4d6412530a4b37950a629"}],"database_specific":{"cpe":"cpe:2.3:a:apache:batik:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.13"}],"source":"CPE_FIELD"}}],"versions":["batik-1_13"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-11987.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N"}]}