Miggo Logo

CVE-2022-44730: Apache Batik information disclosure vulnerability

4.4

CVSS Score
3.1

Basic Information

EPSS Score
0.37051%
Published
8/22/2023
Updated
2/13/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.xmlgraphics:batik-scriptmaven>= 1.0, < 1.171.17

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper class access control in RhinoClassShutter.visibleToScripts method. The pre-patch implementation used a limited whitelist combined with broad pattern-based allowances (like 'org.' prefixes), which could permit access to network-related classes. The commit fixes this by switching to a strict regex-based whitelist. The visibleToScripts() function directly controls class visibility to scripts, making it the entry point for the SSRF vulnerability when combined with the insufficient whitelist.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

S*rv*r-Si** R*qu*st *or**ry (SSR*) vuln*r**ility in *p**** So*tw*r* *oun**tion *p**** XML *r*p*i*s **tik.T*is issu* *****ts *p**** XML *r*p*i*s **tik: *.**. * m*li*ious SV* **n pro** us*r pro*il* / **t* *n* s*n* it *ir**tly *s p*r*m*t*r to * URL.

Reasoning

T** vuln*r**ility st*ms *rom improp*r *l*ss ****ss *ontrol in `R*ino*l*ssS*utt*r.visi*l*ToS*ripts` m*t*o*. T** pr*-p*t** impl*m*nt*tion us** * limit** w*it*list *om*in** wit* *ro** p*tt*rn-**s** *llow*n**s (lik* 'or*.' pr**ix*s), w*i** *oul* p*rmit *