[ 
https://issues.apache.org/jira/browse/TIKA-2499?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16247714#comment-16247714
 ] 

Abhijit Rajwade commented on TIKA-2499:
---------------------------------------

Sonatype Nexus Audior shows that all current Apache tika versions including 
Apache Tika 1.16 are vulnerable.

> Sonatype Nexus Auditor is reporting that Tika 1.13 is using a number of 
> vulnerable Third party components.
> ----------------------------------------------------------------------------------------------------------
>
>                 Key: TIKA-2499
>                 URL: https://issues.apache.org/jira/browse/TIKA-2499
>             Project: Tika
>          Issue Type: Bug
>    Affects Versions: 1.13
>            Reporter: Abhijit Rajwade
>              Labels: Security
>
> Sonatype Nexus Auditor is reporting that Tika 1.13 is using a number of 
> vulnerable Third party components.
> Sr No Vulnerability ID        Description from Nexus Auditor  Vulnerable 
> Third party component        Fixed Third party component
> 1     SONATYPE-2017-0355      Source Sonatype Data Research
> Severity Sonatype CVSS 3.0: 7.5
> Weakness Sonatype CWE: 20
> Explanation
> jackson-core is vulnerable to Denial of Service (DoS). The 
> _reportInvalidToken() function in the UTF8StreamJsonParser and 
> ReaderBasedJsonParser classes allows large amounts of extraneous data to be 
> printed to the server log. An attacker can exploit this vulnerability by 
> crafting a POST request containing large amounts of data. When the data 
> contains invalid JSON, an exception is thrown, which results in the 
> consumption of available disk space when the error message is written to 
> server.log along with the request data.
> Detection
> The application is vulnerable by using this component.
> Recommendation
> We recommend upgrading to a version of this component that is not vulnerable 
> to this specific issue.
> Categories
> Data
> Root Cause
> tika-app-1.13.jar <= ReaderBasedJsonParser.class : [2.0.0-RC1, 2.8.6)
> tika-app-1.13.jar <= UTF8StreamJsonParser.class : [2.0.0-RC1, 2.8.6)
> Advisories
> Attack: https://issues.jboss.org/browse/JBEAP-6316
> Project: https://github.com/FasterXML/jackson-core/pull/322
> Jackson       
> Fixed version: Jackson 2.8.6 or later
> 2     SONATYPE-2017-0359      Source Sonatype Data Research
> Severity Sonatype CVSS 3.0: 7.5
> Weakness Sonatype CWE: 22
> Explanation
> The Apache httpcomponents component is vulnerable to Directory Traversal. The 
> normalizePath() function in the URIBuilder class allows directory traversal 
> characters such as ../. An attacker can exploit this vulnerability by sending 
> a specially crafted request containing this sequence in the URL path, 
> allowing the attacker to traverse beyond the allowed directory and retrieve 
> the contents of arbitrary files from the server, leading to information 
> disclosure.
> Detection
> The application is vulnerable by using this component.
> Recommendation
> We recommend upgrading to a version of this component that is not vulnerable 
> to this specific issue.
> Categories
> Data
> Root Cause
> tika-app-1.13.jar <= URIBuilder.class : [4.2.1-RC1, 4.5.3)
> Advisories
> Project: https://issues.apache.org/jira/browse/HTTPCLIENT-1803
> Apache httpcomponents 
> Fixed Version: Apache httpcomponents 4.5.3 or later
> 3     CVE-2017-12620  Issue CVE-2017-12620
> Source National Vulnerability Database
> Severity Sonatype CVSS 3.0: 7.3
> Weakness Sonatype CWE: 611
> Description from CVE
> When loading models or dictionaries that contain XML it is possible to 
> perform an XXE attack, since Apache OpenNLP is a library, this only affects 
> applications that load models or dictionaries from untrusted sources. The 
> versions 1.5.0 to 1.5.3, 1.6.0, 1.7.0 to 1.7.2, 1.8.0 to 1.8.1 of Apache 
> OpenNLP are affected.
> Explanation
> Apache OpenNLP is vulnerable to XML External Entity (XXE) attack. The 
> constructor in the ConstitParseSampleStream class, createDOM() function in 
> the GeneratorFactory class, and the parse() function in the 
> IrishSentenceBankDocument and LetsmtDocument classes allows unsafe external 
> entities when processing XML data from models and dictionaries. A remote 
> attacker can exploit this by submitting specially crafted XML, which can 
> potentially lead to Denial of Service, Information Disclosure, or other 
> attacks.
> Advisory Deviation Notice 
> The Sonatype security research team discovered that the vulnerability is 
> present in version 1.5.2-incubating-rc1 until 1.8.2, not in all the versions 
> from 1.5.0 till 1.8.2 as the advisory states.
> Detection
> The application is vulnerable by using this component.
> Recommendation
> We recommend upgrading to a version of this component that is not vulnerable 
> to this specific issue.
> Categories
> Data
> Root Cause
> tika-bundle-1.13.jar <= opennlp-tools-1.5.3.jar <= 
> ConstitParseSampleStream.class : [1.5.3-rc1, 1.7.1)
> tika-bundle-1.13.jar <= opennlp-tools-1.5.3.jar <= GeneratorFactory.class : 
> [1.5.3-rc1, 1.7.1)
> Advisories
> Project: http://opennlp.apache.org/news/cve-2017-12620.html
> Close 
> Apache OpenNLP        
> Fixed version: Apache OpenNLP 1.8.2 or later
> 4     SONATYPE-2016-0398      Source Sonatype Data Research
> Severity Sonatype CVSS 3.0: 7.5
> Weakness Sonatype CWE: 22
> Explanation
> Plexus Utils is vulnerable to Directory Traversal. The extractFile() function 
> in the Expand class allows directory traversal characters such as ../ via the 
> entryName parameter. An attacker can exploit this vulnerability by sending a 
> specially crafted request containing this sequence in the URL path, allowing 
> the attacker to traverse beyond the allowed directory and retrieve the 
> contents of arbitrary files from the server, leading to information 
> disclosure.
> Detection
> The application is vulnerable by using this component.
> Recommendation
> We recommend upgrading to a version of this component that is not vulnerable 
> to this specific issue.
> Categories
> Data
> Root Cause
> tika-app-1.13.jar <= Expand.class : ( , 3.0.24)
> Advisories
> Third Party: https://github.com/sonatype/plexus-utils/issues/20
> Plexus Utils  
> Fixed version: Most likely Plexus Utils 3.0.24 or later
> Can we please have Apach Tika release an updated version that uses the fixed 
> Third party components?
> Thx & Regards.
> --- Abhijit Rajwade
> BMC Software



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to