villesaaristo opened a new issue, #6497:
URL: https://github.com/apache/jmeter/issues/6497

   JMeter Version: 5.6.3
   
   
https://github.com/apache/jmeter/blob/91ed1279438cbc2553121c8ea1afded0605b38e5/src/dist/src/dist/expected_release_jars.csv#L130-L131
   
   
https://github.com/apache/jmeter/blob/91ed1279438cbc2553121c8ea1afded0605b38e5/src/bom-thirdparty/build.gradle.kts#L115-L116
   
   https://nvd.nist.gov/vuln/detail/CVE-2025-54988
   
   Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 
through and including 3.2.1 on all platforms allows an attacker to carry out 
XML External Entity injection via a crafted XFA file inside of a PDF. An 
attacker may be able to read sensitive data or trigger malicious requests to 
internal resources or third-party servers. Note that the tika-parser-pdf-module 
is used as a dependency in several Tika packages including at least: 
tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, 
tika-grpc and tika-server-standard.
   
   Users are recommended to upgrade to version 3.2.2, which fixes this issue.
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@jmeter.apache.org.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to