First published: Tue Oct 09 2018(Updated: )
Apache Tika 1.19 included an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2018-11761">CVE-2018-11761</a> which added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika 1.19 is therefore still vulnerable to entity expansions which can lead to a denial of service attack. External Reference: <a href="https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E">https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E</a> Upstream Issue: <a href="https://issues.apache.org/jira/projects/TIKA/issues/TIKA-2727">https://issues.apache.org/jira/projects/TIKA/issues/TIKA-2727</a> Upstream Patch: <a href="https://github.com/apache/tika/commit/86d4ba1e">https://github.com/apache/tika/commit/86d4ba1e</a>
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tika | <1.19.1 | 1.19.1 |
Apache Tika | >=0.1<=1.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11796 is a vulnerability in Apache Tika 1.19 (CVE-2018-11761) that allows XML entity expansion.
CVE-2018-11796 affects Apache Tika versions 1.19 up to, but not including, 1.19.1.
CVE-2018-11796 has a severity value of 7.5, indicating a high severity.
To fix CVE-2018-11796, upgrade Apache Tika to version 1.19.1.
XML entity expansion is a technique where entities in an XML document are expanded to include additional information.