In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
artful fop None
devel fop None
trusty fop 1:1.1.dfsg-2ubuntu1.1
xenial fop None


Release Package Reason
precise fop ignored
precise/esm fop DNE
vivid/stable-phone-overlay fop DNE
vivid/ubuntu-core fop DNE
yakkety fop ignored
zesty fop ignored

Needs Triage

Release Package Reason
upstream fop needs-triage