Page 5 of 23 results (0.022 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Apache Tika server (aka tika-server) in Apache Tika 1.9 might allow remote attackers to read arbitrary files via the HTTP fileUrl header. El servido Apache Tika (también conocido como tika-server) en Apache Tika 1.9 podría permitir a atacantes remotos leer archivos arbitrarios a través de la cabecera HTTP fileUrl. • http://www.openwall.com/lists/oss-security/2015/08/13/5 http://www.securityfocus.com/bid/95020 https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8%401439485507%40%3Cdev.tika.apache.org%3E • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 4%CPEs: 2EXPL: 0

Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization. Apache Tika en versiones anteriores a 1.14 permite la ejecución de código Java para objetos serializados incrustados en archivos MATLAB. El problema existe porque Tika invoca JMatIO para hacer la deserialización nativa. • http://seclists.org/bugtraq/2016/Nov/40 http://www.securityfocus.com/bid/94247 https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a%40%3Cdev.nutch.apache.org%3E https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9%40%3Cuser.nutch.apache.org%3E https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78%40%3Cdev.lucene.apache.org%3E https://lists.apache.org/ • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Apache Tika before 1.13 does not properly initialize the XML parser or choose handlers, which might allow remote attackers to conduct XML External Entity (XXE) attacks via vectors involving (1) spreadsheets in OOXML files and (2) XMP metadata in PDF and other file formats, a related issue to CVE-2016-2175. Las versiones anteriores a la 1.13 de Apache Tika no inicializan el analizador sintáctico XML o elige los manipuladores correctamente, lo que podría permitir que los atacantes remotos lleven a cabo ataques XEE (XML External Entity) mediante vectores que implican (1) hojas de cálculo en archivos OOXML y (2) metadatos XMP en PDF y otros formatos de archivo. Este problema se relaciona con CVE-2016-2175. It was found that the parsing of OOXML, XMP in PDF, and some other file formats by Apache Tika would expand entity references. A remote, unauthenticated attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks. • http://rhn.redhat.com/errata/RHSA-2017-0248.html http://rhn.redhat.com/errata/RHSA-2017-0249.html http://rhn.redhat.com/errata/RHSA-2017-0272.html http://www.securityfocus.com/archive/1/538500/100/0/threaded https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E https://mail-archives.apache.org/mod_mbox/tika-dev/201605.mbox/%3C1705136517.1175366.1464278135251.JavaMail.yahoo%40mail.yahoo.com%3E https://access.redhat.com/security& • CWE-611: Improper Restriction of XML External Entity Reference •