In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0614 In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.
Github GHSA Github GHSA GHSA-h8q5-g2cj-qr5h Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-09-16T18:19:51.122Z

Reserved: 2018-06-05T00:00:00

Link: CVE-2018-11796

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-10-09T22:29:00.393

Modified: 2024-11-21T03:44:03.093

Link: CVE-2018-11796

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-10-10T00:00:00Z

Links: CVE-2018-11796 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses