Bugzilla – Bug 1111309
VUL-1: CVE-2018-11796: tika-core: Denial of Service via XML Entity Expansion Vulnerability
Last modified: 2020-07-13 15:14:48 UTC
CVE-2018-11796: Apache Tika Denial of Service via XML Entity Expansion Vulnerability Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Apache Tika 0.1 to 1.19 Description: In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika 1.19 is therefore still vulnerable to entity expansions which can lead to a denial of service attack. Mitigation: Apache Tika users should upgrade to 1.19.1 or later Credit: This issue was discovered by Slava Gorelik of CloudAlly. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-11796 http://seclists.org/oss-sec/2018/q4/31
Apache Tika 1.19.1 packaged and submitted to SUSE Manager 3.1, 3.2 and Uyuni. Will be part of next releases.
Upstream issue: https://issues.apache.org/jira/projects/TIKA/issues/TIKA-2727 Upstream patch: https://github.com/apache/tika/commit/86d4ba1e
tika-core in SUSE manager is not affected since its version ships already the fix