Vulnerabilites related to Apache Software Foundation - Apache Tika
cve-2018-11762
Vulnerability from cvelistv5
Published
2018-09-19 14:00
Modified
2024-09-16 20:26
Severity ?
EPSS score ?
Summary
In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105515 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b%40%3Cdev.tika.apache.org%3E | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: 0.9 to 1.18 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:17:09.110Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "105515", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/105515", }, { name: "[tika-dev] 20180919 [CVE-2018-11762] Zip Slip Vulnerability in Apache Tika's tika-app", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b%40%3Cdev.tika.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "0.9 to 1.18", }, ], }, ], datePublic: "2018-09-19T00:00:00", descriptions: [ { lang: "en", value: "In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as \"C:/evil.bat\", tika-app would overwrite that file.", }, ], problemTypes: [ { descriptions: [ { description: "Zip Slip Vulnerability in Apache Tika's tika-app", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-07T09:57:02", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "105515", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/105515", }, { name: "[tika-dev] 20180919 [CVE-2018-11762] Zip Slip Vulnerability in Apache Tika's tika-app", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b%40%3Cdev.tika.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", DATE_PUBLIC: "2018-09-19T00:00:00", ID: "CVE-2018-11762", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_value: "0.9 to 1.18", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as \"C:/evil.bat\", tika-app would overwrite that file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Zip Slip Vulnerability in Apache Tika's tika-app", }, ], }, ], }, references: { reference_data: [ { name: "105515", refsource: "BID", url: "http://www.securityfocus.com/bid/105515", }, { name: "[tika-dev] 20180919 [CVE-2018-11762] Zip Slip Vulnerability in Apache Tika's tika-app", refsource: "MLIST", url: "https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2018-11762", datePublished: "2018-09-19T14:00:00Z", dateReserved: "2018-06-05T00:00:00", dateUpdated: "2024-09-16T20:26:36.852Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-30126
Vulnerability from cvelistv5
Published
2022-05-16 17:05
Modified
2024-08-03 06:40
Severity ?
EPSS score ?
Summary
In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.2 and 2.4.0
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread/dh3syg68nxogbmlg13srd6gjn3h2z6r4 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/05/16/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2022/05/31/2 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2022/06/27/5 | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/security-alerts/cpujul2022.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220624-0004/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: Apache Tika < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T06:40:47.590Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://lists.apache.org/thread/dh3syg68nxogbmlg13srd6gjn3h2z6r4", }, { name: "[oss-security] 20220516 CVE-2022-30126: Apache Tika Regular Expression Denial of Service in Standards Extractor", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/05/16/3", }, { name: "[oss-security] 20220531 CVE-2022-30973: Apache Tika: Missing fix for CVE-2022-30126 in 1.28.2", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/05/31/2", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20220624-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { lessThanOrEqual: "1.28.1", status: "affected", version: "Apache Tika", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "This issue was discovered and reported by the CodeQL team members [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@joefarebrother (Joseph Farebrother)](https://github.com/joefarebrother).", }, ], descriptions: [ { lang: "en", value: "In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.2 and 2.4.0", }, ], metrics: [ { other: { content: { other: "low", }, type: "unknown", }, }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-07-25T16:54:25", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://lists.apache.org/thread/dh3syg68nxogbmlg13srd6gjn3h2z6r4", }, { name: "[oss-security] 20220516 CVE-2022-30126: Apache Tika Regular Expression Denial of Service in Standards Extractor", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/05/16/3", }, { name: "[oss-security] 20220531 CVE-2022-30973: Apache Tika: Missing fix for CVE-2022-30126 in 1.28.2", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/05/31/2", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20220624-0004/", }, ], source: { discovery: "UNKNOWN", }, title: "Apache Tika Regular Expression Denial of Service in Standards Extractor", workarounds: [ { lang: "en", value: "Upgrade to 1.28.2 or 2.4.0", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2022-30126", STATE: "PUBLIC", TITLE: "Apache Tika Regular Expression Denial of Service in Standards Extractor", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_affected: "<=", version_name: "Apache Tika", version_value: "1.28.1", }, { version_affected: "<=", version_name: "Apache Tika", version_value: "2.3.0 +1", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, credit: [ { lang: "eng", value: "This issue was discovered and reported by the CodeQL team members [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@joefarebrother (Joseph Farebrother)](https://github.com/joefarebrother).", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.2 and 2.4.0", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: [ { other: "low", }, ], problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://lists.apache.org/thread/dh3syg68nxogbmlg13srd6gjn3h2z6r4", refsource: "MISC", url: "https://lists.apache.org/thread/dh3syg68nxogbmlg13srd6gjn3h2z6r4", }, { name: "[oss-security] 20220516 CVE-2022-30126: Apache Tika Regular Expression Denial of Service in Standards Extractor", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/05/16/3", }, { name: "[oss-security] 20220531 CVE-2022-30973: Apache Tika: Missing fix for CVE-2022-30126 in 1.28.2", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/05/31/2", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { name: "https://www.oracle.com/security-alerts/cpujul2022.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { name: "https://security.netapp.com/advisory/ntap-20220624-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220624-0004/", }, ], }, source: { discovery: "UNKNOWN", }, work_around: [ { lang: "en", value: "Upgrade to 1.28.2 or 2.4.0", }, ], }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2022-30126", datePublished: "2022-05-16T17:05:13", dateReserved: "2022-05-03T00:00:00", dateUpdated: "2024-08-03T06:40:47.590Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8017
Vulnerability from cvelistv5
Published
2018-09-19 14:00
Modified
2024-09-17 02:27
Severity ?
EPSS score ?
Summary
In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91%40%3Cdev.tika.apache.org%3E | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/105513 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: 1.2 to 1.18 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T06:46:11.463Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[tika-dev] 20180919 [CVE-2018-8017] Apache Tika Denial of Service Vulnerability -- Potential Infinite Loop in IptcAnpaParser", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91%40%3Cdev.tika.apache.org%3E", }, { name: "105513", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/105513", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "1.2 to 1.18", }, ], }, ], datePublic: "2018-09-19T00:00:00", descriptions: [ { lang: "en", value: "In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.", }, ], problemTypes: [ { descriptions: [ { description: "DoS Vulnerability -- Potential Infinite Loop in IptcAnpaParser", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-05T09:57:01", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "[tika-dev] 20180919 [CVE-2018-8017] Apache Tika Denial of Service Vulnerability -- Potential Infinite Loop in IptcAnpaParser", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91%40%3Cdev.tika.apache.org%3E", }, { name: "105513", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/105513", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", DATE_PUBLIC: "2018-09-19T00:00:00", ID: "CVE-2018-8017", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_value: "1.2 to 1.18", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS Vulnerability -- Potential Infinite Loop in IptcAnpaParser", }, ], }, ], }, references: { reference_data: [ { name: "[tika-dev] 20180919 [CVE-2018-8017] Apache Tika Denial of Service Vulnerability -- Potential Infinite Loop in IptcAnpaParser", refsource: "MLIST", url: "https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91@%3Cdev.tika.apache.org%3E", }, { name: "105513", refsource: "BID", url: "http://www.securityfocus.com/bid/105513", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2018-8017", datePublished: "2018-09-19T14:00:00Z", dateReserved: "2018-03-09T00:00:00", dateUpdated: "2024-09-17T02:27:20.580Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-25169
Vulnerability from cvelistv5
Published
2022-05-16 17:05
Modified
2024-08-03 04:36
Severity ?
EPSS score ?
Summary
The BPG parser in versions of Apache Tika before 1.28.2 and 2.4.0 may allocate an unreasonable amount of memory on carefully crafted files.
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread/t3tb51sf0k2pmbnzsrrrm23z9r1c10rk | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/05/16/4 | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/security-alerts/cpujul2022.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220804-0004/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: Apache Tika < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:36:05.111Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://lists.apache.org/thread/t3tb51sf0k2pmbnzsrrrm23z9r1c10rk", }, { name: "[oss-security] 20220516 CVE-2022-25169: Apache Tika BPGParser Memory Usage DoS", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/05/16/4", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20220804-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { lessThanOrEqual: "1.28.1", status: "affected", version: "Apache Tika", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The BPG parser in versions of Apache Tika before 1.28.2 and 2.4.0 may allocate an unreasonable amount of memory on carefully crafted files.", }, ], problemTypes: [ { descriptions: [ { description: "DoS caused by unreasonable memory allocation", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-04T17:06:39", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://lists.apache.org/thread/t3tb51sf0k2pmbnzsrrrm23z9r1c10rk", }, { name: "[oss-security] 20220516 CVE-2022-25169: Apache Tika BPGParser Memory Usage DoS", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/05/16/4", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20220804-0004/", }, ], source: { discovery: "UNKNOWN", }, title: "Apache Tika BPGParser Memory Usage DoS", x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2022-25169", STATE: "PUBLIC", TITLE: "Apache Tika BPGParser Memory Usage DoS", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_affected: "<=", version_name: "Apache Tika", version_value: "1.28.1", }, { version_affected: "<=", version_name: "Apache Tika", version_value: "2.3.0 +1", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The BPG parser in versions of Apache Tika before 1.28.2 and 2.4.0 may allocate an unreasonable amount of memory on carefully crafted files.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: [ {}, ], problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS caused by unreasonable memory allocation", }, ], }, ], }, references: { reference_data: [ { name: "https://lists.apache.org/thread/t3tb51sf0k2pmbnzsrrrm23z9r1c10rk", refsource: "MISC", url: "https://lists.apache.org/thread/t3tb51sf0k2pmbnzsrrrm23z9r1c10rk", }, { name: "[oss-security] 20220516 CVE-2022-25169: Apache Tika BPGParser Memory Usage DoS", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/05/16/4", }, { name: "https://www.oracle.com/security-alerts/cpujul2022.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpujul2022.html", }, { name: "https://security.netapp.com/advisory/ntap-20220804-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220804-0004/", }, ], }, source: { discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2022-25169", datePublished: "2022-05-16T17:05:11", dateReserved: "2022-02-15T00:00:00", dateUpdated: "2024-08-03T04:36:05.111Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-11796
Vulnerability from cvelistv5
Published
2018-10-09 22:00
Modified
2024-09-16 18:19
Severity ?
EPSS score ?
Summary
In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105585 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05%40%3Cdev.tika.apache.org%3E | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190903-0002/ | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2019:3892 | vendor-advisory, x_refsource_REDHAT |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: Apache Tomcat 0.1 to 1.19 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:17:09.143Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "105585", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/105585", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05%40%3Cdev.tika.apache.org%3E", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20190903-0002/", }, { name: "RHSA-2019:3892", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:3892", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "Apache Tomcat 0.1 to 1.19", }, ], }, ], datePublic: "2018-10-09T00:00:00", descriptions: [ { lang: "en", value: "In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service Vulnerability", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-14T23:07:10", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "105585", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/105585", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05%40%3Cdev.tika.apache.org%3E", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20190903-0002/", }, { name: "RHSA-2019:3892", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:3892", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", DATE_PUBLIC: "2018-10-09T00:00:00", ID: "CVE-2018-11796", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_value: "Apache Tomcat 0.1 to 1.19", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service Vulnerability", }, ], }, ], }, references: { reference_data: [ { name: "105585", refsource: "BID", url: "http://www.securityfocus.com/bid/105585", }, { name: "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E", refsource: "CONFIRM", url: "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E", }, { name: "https://security.netapp.com/advisory/ntap-20190903-0002/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20190903-0002/", }, { name: "RHSA-2019:3892", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:3892", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2018-11796", datePublished: "2018-10-09T22:00:00Z", dateReserved: "2018-06-05T00:00:00", dateUpdated: "2024-09-16T18:19:51.122Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-1339
Vulnerability from cvelistv5
Published
2018-04-25 21:00
Modified
2024-09-16 17:14
Severity ?
EPSS score ?
Summary
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:2669 | vendor-advisory, x_refsource_REDHAT | |
https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828%40%3Cdev.tika.apache.org%3E | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: < 1.18 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:59:38.420Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:2669", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2669", }, { name: "[dev] 20180425 [CVE-2018-1339] DoS (Infinite Loop) Vulnerability in Apache Tika's ChmParser", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828%40%3Cdev.tika.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "< 1.18", }, ], }, ], datePublic: "2018-04-25T00:00:00", descriptions: [ { lang: "en", value: "A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.", }, ], problemTypes: [ { descriptions: [ { description: "Denial Of Service Vulnerability -- infinite loop", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-09-12T09:57:01", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "RHSA-2018:2669", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2669", }, { name: "[dev] 20180425 [CVE-2018-1339] DoS (Infinite Loop) Vulnerability in Apache Tika's ChmParser", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828%40%3Cdev.tika.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", DATE_PUBLIC: "2018-04-25T00:00:00", ID: "CVE-2018-1339", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_value: "< 1.18", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial Of Service Vulnerability -- infinite loop", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:2669", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2669", }, { name: "[dev] 20180425 [CVE-2018-1339] DoS (Infinite Loop) Vulnerability in Apache Tika's ChmParser", refsource: "MLIST", url: "https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828@%3Cdev.tika.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2018-1339", datePublished: "2018-04-25T21:00:00Z", dateReserved: "2017-12-07T00:00:00", dateUpdated: "2024-09-16T17:14:39.308Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-30973
Vulnerability from cvelistv5
Published
2022-05-31 13:20
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/05/31/2 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2022/06/27/5 | mailing-list, x_refsource_MLIST | |
https://security.netapp.com/advisory/ntap-20220722-0004/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: Apache Tika < |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T07:03:40.228Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p", }, { name: "[oss-security] 20220531 CVE-2022-30973: Apache Tika: Missing fix for CVE-2022-30126 in 1.28.2", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/05/31/2", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20220722-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { lessThanOrEqual: "1.28.2", status: "affected", version: "Apache Tika", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "This issue was reported by Cathy Hu, SUSE Software Solutions Germany GmbH.", }, ], descriptions: [ { lang: "en", value: "We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-07-22T18:06:13", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p", }, { name: "[oss-security] 20220531 CVE-2022-30973: Apache Tika: Missing fix for CVE-2022-30126 in 1.28.2", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/05/31/2", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20220722-0004/", }, ], source: { discovery: "UNKNOWN", }, title: "Missing fix for CVE-2022-30126 in 1.28.2", workarounds: [ { lang: "en", value: "Avoid using the StandardsExtractingContentHandler or upgrade to Tika 1.28.3 or 2.4.0", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2022-30973", STATE: "PUBLIC", TITLE: "Missing fix for CVE-2022-30126 in 1.28.2", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_affected: "<=", version_name: "Apache Tika", version_value: "1.28.2", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, credit: [ { lang: "eng", value: "This issue was reported by Cathy Hu, SUSE Software Solutions Germany GmbH.", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: [ {}, ], problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p", refsource: "MISC", url: "https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p", }, { name: "[oss-security] 20220531 CVE-2022-30973: Apache Tika: Missing fix for CVE-2022-30126 in 1.28.2", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/05/31/2", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { name: "https://security.netapp.com/advisory/ntap-20220722-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220722-0004/", }, ], }, source: { discovery: "UNKNOWN", }, work_around: [ { lang: "en", value: "Avoid using the StandardsExtractingContentHandler or upgrade to Tika 1.28.3 or 2.4.0", }, ], }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2022-30973", datePublished: "2022-05-31T13:20:10", dateReserved: "2022-05-17T00:00:00", dateUpdated: "2024-08-03T07:03:40.228Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-28657
Vulnerability from cvelistv5
Published
2021-03-31 07:35
Modified
2025-02-13 16:27
Severity ?
EPSS score ?
Summary
A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later.
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E | x_refsource_MISC | |
https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b%40%3Cnotifications.james.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/security-alerts/cpuoct2021.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210507-0004/ | x_refsource_CONFIRM | |
https://www.oracle.com/security-alerts/cpuapr2022.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: Apache Tika < 1.26 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T21:47:33.042Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E", }, { name: "[james-notifications] 20210501 [GitHub] [james-project] chibenwa opened a new pull request #414: [UPGRADE] Adopt Apache Tika 1.26", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b%40%3Cnotifications.james.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20210507-0004/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2022.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { lessThan: "1.26", status: "affected", version: "Apache Tika", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Apache Tika would like to thank Khaled Nassar for reporting this issue.", }, ], descriptions: [ { lang: "en", value: "A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-835", description: "CWE-835 Infinite Loop", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-03T21:48:19.000Z", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E", }, { name: "[james-notifications] 20210501 [GitHub] [james-project] chibenwa opened a new pull request #414: [UPGRADE] Adopt Apache Tika 1.26", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b%40%3Cnotifications.james.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20210507-0004/", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuapr2022.html", }, ], source: { discovery: "UNKNOWN", }, title: "Infinite loop in Apache Tika's MP3 parser", workarounds: [ { lang: "en", value: "Users should upgrade to 1.26 or later.", }, ], x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2021-28657", STATE: "PUBLIC", TITLE: "Infinite loop in Apache Tika's MP3 parser", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_affected: "<", version_name: "Apache Tika", version_value: "1.26", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, credit: [ { lang: "eng", value: "Apache Tika would like to thank Khaled Nassar for reporting this issue.", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-835 Infinite Loop", }, ], }, ], }, references: { reference_data: [ { name: "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E", refsource: "MISC", url: "https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E", }, { name: "[james-notifications] 20210501 [GitHub] [james-project] chibenwa opened a new pull request #414: [UPGRADE] Adopt Apache Tika 1.26", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E", }, { name: "https://www.oracle.com/security-alerts/cpuoct2021.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuoct2021.html", }, { name: "https://security.netapp.com/advisory/ntap-20210507-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20210507-0004/", }, { name: "https://www.oracle.com/security-alerts/cpuapr2022.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2022.html", }, ], }, source: { discovery: "UNKNOWN", }, work_around: [ { lang: "en", value: "Users should upgrade to 1.26 or later.", }, ], }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2021-28657", datePublished: "2021-03-31T07:35:14.000Z", dateReserved: "2021-03-17T00:00:00.000Z", dateUpdated: "2025-02-13T16:27:59.935Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-11761
Vulnerability from cvelistv5
Published
2018-09-19 14:00
Modified
2024-09-16 18:39
Severity ?
EPSS score ?
Summary
In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105514 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421%40%3Cdev.tika.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: 0.1 to 1.18 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T08:17:09.097Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "105514", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/105514", }, { name: "[tika-dev] 20180919 [CVE-2018-11761] Apache Tika DoS XML Entity Expansion Vulnerability", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421%40%3Cdev.tika.apache.org%3E", }, { name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "0.1 to 1.18", }, ], }, ], datePublic: "2018-09-19T00:00:00", descriptions: [ { lang: "en", value: "In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service via XML Entity Expansion", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-11-12T19:07:08", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "105514", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/105514", }, { name: "[tika-dev] 20180919 [CVE-2018-11761] Apache Tika DoS XML Entity Expansion Vulnerability", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421%40%3Cdev.tika.apache.org%3E", }, { name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", DATE_PUBLIC: "2018-09-19T00:00:00", ID: "CVE-2018-11761", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_value: "0.1 to 1.18", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service via XML Entity Expansion", }, ], }, ], }, references: { reference_data: [ { name: "105514", refsource: "BID", url: "http://www.securityfocus.com/bid/105514", }, { name: "[tika-dev] 20180919 [CVE-2018-11761] Apache Tika DoS XML Entity Expansion Vulnerability", refsource: "MLIST", url: "https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421@%3Cdev.tika.apache.org%3E", }, { name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", refsource: "MLIST", url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2018-11761", datePublished: "2018-09-19T14:00:00Z", dateReserved: "2018-06-05T00:00:00", dateUpdated: "2024-09-16T18:39:59.951Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-1338
Vulnerability from cvelistv5
Published
2018-04-25 21:00
Modified
2024-09-17 00:07
Severity ?
EPSS score ?
Summary
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:2669 | vendor-advisory, x_refsource_REDHAT | |
https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932%40%3Cdev.tika.apache.org%3E | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: < 1.18 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:59:38.597Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2018:2669", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:2669", }, { name: "[dev] 20180425 [CVE-2018-1338] DoS (Infinite Loop) Vulnerability in Apache Tika's BPGParser", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932%40%3Cdev.tika.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "< 1.18", }, ], }, ], datePublic: "2018-04-25T00:00:00", descriptions: [ { lang: "en", value: "A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.", }, ], problemTypes: [ { descriptions: [ { description: "DoS Vulnerability-- infinite loop", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-09-12T09:57:01", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "RHSA-2018:2669", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:2669", }, { name: "[dev] 20180425 [CVE-2018-1338] DoS (Infinite Loop) Vulnerability in Apache Tika's BPGParser", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932%40%3Cdev.tika.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", DATE_PUBLIC: "2018-04-25T00:00:00", ID: "CVE-2018-1338", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_value: "< 1.18", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DoS Vulnerability-- infinite loop", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2018:2669", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:2669", }, { name: "[dev] 20180425 [CVE-2018-1338] DoS (Infinite Loop) Vulnerability in Apache Tika's BPGParser", refsource: "MLIST", url: "https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2018-1338", datePublished: "2018-04-25T21:00:00Z", dateReserved: "2017-12-07T00:00:00", dateUpdated: "2024-09-17T00:07:04.416Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-17197
Vulnerability from cvelistv5
Published
2018-12-24 14:00
Modified
2024-08-05 10:39
Severity ?
EPSS score ?
Summary
A carefully crafted or corrupt sqlite file can cause an infinite loop in Apache Tika's SQLite3Parser in versions 1.8-1.19.1 of Apache Tika.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106293 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3%40%3Cdev.tika.apache.org%3E | x_refsource_MISC | |
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | x_refsource_MISC | |
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/security-alerts/cpuapr2020.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: Apache Tika 1.8-1.19.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:39:59.588Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106293", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106293", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3%40%3Cdev.tika.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "Apache Tika 1.8-1.19.1", }, ], }, ], datePublic: "2018-12-24T00:00:00", descriptions: [ { lang: "en", value: "A carefully crafted or corrupt sqlite file can cause an infinite loop in Apache Tika's SQLite3Parser in versions 1.8-1.19.1 of Apache Tika.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-15T21:06:44", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "106293", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106293", }, { tags: [ "x_refsource_MISC", ], url: "https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3%40%3Cdev.tika.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2018-17197", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_value: "Apache Tika 1.8-1.19.1", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A carefully crafted or corrupt sqlite file can cause an infinite loop in Apache Tika's SQLite3Parser in versions 1.8-1.19.1 of Apache Tika.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "106293", refsource: "BID", url: "http://www.securityfocus.com/bid/106293", }, { name: "https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3@%3Cdev.tika.apache.org%3E", refsource: "MISC", url: "https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3@%3Cdev.tika.apache.org%3E", }, { name: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", refsource: "MISC", url: "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", }, { name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E", }, { name: "https://www.oracle.com/security-alerts/cpuapr2020.html", refsource: "MISC", url: "https://www.oracle.com/security-alerts/cpuapr2020.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2018-17197", datePublished: "2018-12-24T14:00:00", dateReserved: "2018-09-19T00:00:00", dateUpdated: "2024-08-05T10:39:59.588Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-33879
Vulnerability from cvelistv5
Published
2022-06-27 21:40
Modified
2024-08-03 08:09
Severity ?
EPSS score ?
Summary
The initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler were insufficient, and we found a separate, new regex DoS in a different regex in the StandardsExtractingContentHandler. These are now fixed in 1.28.4 and 2.4.1.
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2022/06/27/5 | mailing-list, x_refsource_MLIST | |
https://security.netapp.com/advisory/ntap-20220812-0004/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: Apache Tika < 2.4.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T08:09:22.671Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20220812-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { changes: [ { at: "1.28.4", status: "unaffected", }, ], lessThan: "2.4.1", status: "affected", version: "Apache Tika", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "This incomplete fix was discovered and reported by the CodeQL team member [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@jarlob (Jaroslav Lobačevski)](https://github.com/jarlob) from Github Security Lab. The new ReDos was discovered by the Apache Tika team.", }, ], descriptions: [ { lang: "en", value: "The initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler were insufficient, and we found a separate, new regex DoS in a different regex in the StandardsExtractingContentHandler. These are now fixed in 1.28.4 and 2.4.1.", }, ], metrics: [ { other: { content: { other: "low", }, type: "unknown", }, }, ], problemTypes: [ { descriptions: [ { description: "Regex Denial Of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-12T16:06:59", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20220812-0004/", }, ], source: { discovery: "UNKNOWN", }, title: "Incomplete fix and new regex DoS in StandardsExtractingContentHandler", x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", ID: "CVE-2022-33879", STATE: "PUBLIC", TITLE: "Incomplete fix and new regex DoS in StandardsExtractingContentHandler", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_affected: "<", version_name: "Apache Tika", version_value: "2.4.1", }, { version_affected: "<", version_name: "Apache Tika", version_value: "1.28.4", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, credit: [ { lang: "eng", value: "This incomplete fix was discovered and reported by the CodeQL team member [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@jarlob (Jaroslav Lobačevski)](https://github.com/jarlob) from Github Security Lab. The new ReDos was discovered by the Apache Tika team.", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler were insufficient, and we found a separate, new regex DoS in a different regex in the StandardsExtractingContentHandler. These are now fixed in 1.28.4 and 2.4.1.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: [ { other: "low", }, ], problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Regex Denial Of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh", refsource: "MISC", url: "https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh", }, { name: "[oss-security] 20220627 CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/06/27/5", }, { name: "https://security.netapp.com/advisory/ntap-20220812-0004/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220812-0004/", }, ], }, source: { discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2022-33879", datePublished: "2022-06-27T21:40:10", dateReserved: "2022-06-16T00:00:00", dateUpdated: "2024-08-03T08:09:22.671Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-1335
Vulnerability from cvelistv5
Published
2018-04-25 21:00
Modified
2024-09-17 03:58
Severity ?
EPSS score ?
Summary
From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.
References
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca%40%3Cdev.tika.apache.org%3E | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/104001 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/46540/ | exploit, x_refsource_EXPLOIT-DB | |
http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html | x_refsource_MISC | |
https://access.redhat.com/errata/RHSA-2019:3140 | vendor-advisory, x_refsource_REDHAT |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tika |
Version: 1.7 to 1.17 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:59:38.573Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[dev] 20180425 [CVE-2018-1335] Command Injection Vulnerability in Apache Tika's tika-server module", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca%40%3Cdev.tika.apache.org%3E", }, { name: "104001", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/104001", }, { name: "46540", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/46540/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html", }, { name: "RHSA-2019:3140", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:3140", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Apache Tika", vendor: "Apache Software Foundation", versions: [ { status: "affected", version: "1.7 to 1.17", }, ], }, ], datePublic: "2018-04-25T00:00:00", descriptions: [ { lang: "en", value: "From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.", }, ], problemTypes: [ { descriptions: [ { description: "Command Injection", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-17T17:06:25", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { name: "[dev] 20180425 [CVE-2018-1335] Command Injection Vulnerability in Apache Tika's tika-server module", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca%40%3Cdev.tika.apache.org%3E", }, { name: "104001", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/104001", }, { name: "46540", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/46540/", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html", }, { name: "RHSA-2019:3140", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:3140", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@apache.org", DATE_PUBLIC: "2018-04-25T00:00:00", ID: "CVE-2018-1335", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Apache Tika", version: { version_data: [ { version_value: "1.7 to 1.17", }, ], }, }, ], }, vendor_name: "Apache Software Foundation", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Command Injection", }, ], }, ], }, references: { reference_data: [ { name: "[dev] 20180425 [CVE-2018-1335] Command Injection Vulnerability in Apache Tika's tika-server module", refsource: "MLIST", url: "https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@%3Cdev.tika.apache.org%3E", }, { name: "104001", refsource: "BID", url: "http://www.securityfocus.com/bid/104001", }, { name: "46540", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/46540/", }, { name: "http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html", }, { name: "RHSA-2019:3140", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:3140", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2018-1335", datePublished: "2018-04-25T21:00:00Z", dateReserved: "2017-12-07T00:00:00", dateUpdated: "2024-09-17T03:58:34.667Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }