CVE-2018-1335 – Apache Tika 1.15 - 1.17 - Header Command Injection
https://notcve.org/view.php?id=CVE-2018-1335
From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18. De las versiones 1.7 a 1.17 de Apache Tika, los clientes podían enviar cabeceras cuidadosamente manipuladas a tika-server que podrían emplearse para inyectar comandos en la línea de comandos del servidor que ejecuta tika-server. Esta vulnerabilidad solo afecta a quienes ejecuten tika-server en un servidor abierto a clientes no fiables. • https://www.exploit-db.com/exploits/47208 https://www.exploit-db.com/exploits/46540 https://github.com/SkyBlueEternal/CVE-2018-1335-EXP-GUI https://github.com/DigitalNinja00/CVE-2018-1335 https://github.com/siramk/CVE-2018-1335 https://github.com/N0b1e6/CVE-2018-1335-Python3 http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html http://www.securityfocus.com/bid/104001 https://access.redhat.com/errata/RHSA-2019:3140 https://lists.apache.org • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2018-1339 – tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service
https://notcve.org/view.php?id=CVE-2018-1339
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18. Un archivo cuidadosamente manipulado (o fuzzeado) puede desencadenar un bucle infinito en ChmParser en las versiones anteriores a la 1.18 de Apache Tika. • https://access.redhat.com/errata/RHSA-2018:2669 https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828%40%3Cdev.tika.apache.org%3E https://access.redhat.com/security/cve/CVE-2018-1339 https://bugzilla.redhat.com/show_bug.cgi?id=1572424 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2015-3271
https://notcve.org/view.php?id=CVE-2015-3271
Apache Tika server (aka tika-server) in Apache Tika 1.9 might allow remote attackers to read arbitrary files via the HTTP fileUrl header. El servido Apache Tika (también conocido como tika-server) en Apache Tika 1.9 podría permitir a atacantes remotos leer archivos arbitrarios a través de la cabecera HTTP fileUrl. • http://www.openwall.com/lists/oss-security/2015/08/13/5 http://www.securityfocus.com/bid/95020 https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8%401439485507%40%3Cdev.tika.apache.org%3E • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2016-6809
https://notcve.org/view.php?id=CVE-2016-6809
Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization. Apache Tika en versiones anteriores a 1.14 permite la ejecución de código Java para objetos serializados incrustados en archivos MATLAB. El problema existe porque Tika invoca JMatIO para hacer la deserialización nativa. • http://seclists.org/bugtraq/2016/Nov/40 http://www.securityfocus.com/bid/94247 https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a%40%3Cdev.nutch.apache.org%3E https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9%40%3Cuser.nutch.apache.org%3E https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78%40%3Cdev.lucene.apache.org%3E https://lists.apache.org/ • CWE-502: Deserialization of Untrusted Data •