Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
github.com/apache/xmlgraphics-commons
github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183
issues.apache.org/jira/browse/XGC-122
lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E
lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E
lists.apache.org/thread.html/ra8f4d6ae402ec020ee3e8c28632c91be131c4d8b4c9c6756a179b12b@%3Cdev.jmeter.apache.org%3E
lists.fedoraproject.org/archives/list/[email protected]/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH
lists.fedoraproject.org/archives/list/[email protected]/message/JP4XA56DA3BFNRBBLBXM6ZAI5RUVFA33
nvd.nist.gov/vuln/detail/CVE-2020-11988
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuoct2021.html
xmlgraphics.apache.org/security.html