[
https://issues.apache.org/jira/browse/TIKA-2829?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16772142#comment-16772142
]
Tim Allison commented on TIKA-2829:
-----------------------------------
Are you able to submit a unit test that shows this vulnerability in action in
the Tika framework...ideally via a patch to [email protected]
Would this vulnerability be triggered by users who take the output of Tika and
display it in a browser?
Thank you!
> Security Vulnerability in boilerpipe (CVE-2018-16481)
> -----------------------------------------------------
>
> Key: TIKA-2829
> URL: https://issues.apache.org/jira/browse/TIKA-2829
> Project: Tika
> Issue Type: Bug
> Components: parser
> Affects Versions: 1.20
> Reporter: Alex LI
> Priority: Major
>
> org.apache.tika:tika-parsers:1.20 depending on boilerpipe, which the
> dependency reflections uses.
> [https://nvd.nist.gov/vuln/detail/CVE-2018-16481]
> h3. Current Description
> A XSS vulnerability was found in html-page <=2.1.1 that allows malicious
> Javascript code to be executed in the user's browser due to the absence of
> sanitization of the paths before rendering.
> ==========================
> [info] de.l3s.boilerpipe:boilerpipe:1.1.0
> [info] +-org.apache.tika:tika-parsers:1.20
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)