Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-11796

Опубликовано: 10 окт. 2018
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.

Отчет

This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6tika-coreOut of support scope
Red Hat JBoss BRMS 5tika-coreOut of support scope
Red Hat JBoss BRMS 6tika-coreOut of support scope
Red Hat JBoss Data Virtualization 6tika-coreOut of support scope
Red Hat JBoss Fuse Service Works 6tika-coreOut of support scope
Red Hat Satellite 5tikaWill not fix
Red Hat Software Collectionsrh-eclipse46-tikaNot affected
Red Hat Fuse 7.5.0camel-tikaFixedRHSA-2019:389214.11.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-776
https://bugzilla.redhat.com/show_bug.cgi?id=1639090tika: Incomplete fix allows for XML entity expansion resulting in denial of service

EPSS

Процентиль: 88%
0.0394
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.

CVSS3: 7.5
nvd
больше 7 лет назад

In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.

CVSS3: 7.5
debian
больше 7 лет назад

In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion lim ...

CVSS3: 7.5
github
больше 7 лет назад

Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack

EPSS

Процентиль: 88%
0.0394
Низкий

7.5 High

CVSS3