Page 4 of 19 results (0.006 seconds)

CVSS: 9.3EPSS: 96%CPEs: 1EXPL: 6

From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18. De las versiones 1.7 a 1.17 de Apache Tika, los clientes podían enviar cabeceras cuidadosamente manipuladas a tika-server que podrían emplearse para inyectar comandos en la línea de comandos del servidor que ejecuta tika-server. Esta vulnerabilidad solo afecta a quienes ejecuten tika-server en un servidor abierto a clientes no fiables. • https://www.exploit-db.com/exploits/47208 https://www.exploit-db.com/exploits/46540 https://github.com/SkyBlueEternal/CVE-2018-1335-EXP-GUI https://github.com/DigitalNinja00/CVE-2018-1335 https://github.com/siramk/CVE-2018-1335 https://github.com/N0b1e6/CVE-2018-1335-Python3 http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html http://www.securityfocus.com/bid/104001 https://access.redhat.com/errata/RHSA-2019:3140 https://lists.apache.org&# • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18. Un archivo cuidadosamente manipulado (o fuzzeado) puede desencadenar un bucle infinito en ChmParser en las versiones anteriores a la 1.18 de Apache Tika. • https://access.redhat.com/errata/RHSA-2018:2669 https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828%40%3Cdev.tika.apache.org%3E https://access.redhat.com/security/cve/CVE-2018-1339 https://bugzilla.redhat.com/show_bug.cgi?id=1572424 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 9.8EPSS: 4%CPEs: 2EXPL: 0

Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization. Apache Tika en versiones anteriores a 1.14 permite la ejecución de código Java para objetos serializados incrustados en archivos MATLAB. El problema existe porque Tika invoca JMatIO para hacer la deserialización nativa. • http://seclists.org/bugtraq/2016/Nov/40 http://www.securityfocus.com/bid/94247 https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a%40%3Cdev.nutch.apache.org%3E https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9%40%3Cuser.nutch.apache.org%3E https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78%40%3Cdev.lucene.apache.org%3E https://lists.apache.org/ • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Apache Tika before 1.13 does not properly initialize the XML parser or choose handlers, which might allow remote attackers to conduct XML External Entity (XXE) attacks via vectors involving (1) spreadsheets in OOXML files and (2) XMP metadata in PDF and other file formats, a related issue to CVE-2016-2175. Las versiones anteriores a la 1.13 de Apache Tika no inicializan el analizador sintáctico XML o elige los manipuladores correctamente, lo que podría permitir que los atacantes remotos lleven a cabo ataques XEE (XML External Entity) mediante vectores que implican (1) hojas de cálculo en archivos OOXML y (2) metadatos XMP en PDF y otros formatos de archivo. Este problema se relaciona con CVE-2016-2175. It was found that the parsing of OOXML, XMP in PDF, and some other file formats by Apache Tika would expand entity references. A remote, unauthenticated attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks. • http://rhn.redhat.com/errata/RHSA-2017-0248.html http://rhn.redhat.com/errata/RHSA-2017-0249.html http://rhn.redhat.com/errata/RHSA-2017-0272.html http://www.securityfocus.com/archive/1/538500/100/0/threaded https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E https://mail-archives.apache.org/mod_mbox/tika-dev/201605.mbox/%3C1705136517.1175366.1464278135251.JavaMail.yahoo%40mail.yahoo.com%3E https://access.redhat.com/security& • CWE-611: Improper Restriction of XML External Entity Reference •