[ 
https://issues.apache.org/jira/browse/TIKA-2829?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16785101#comment-16785101
 ] 

Tim Allison commented on TIKA-2829:
-----------------------------------

Thank you for the link. Can you put together an example input file, run it 
through Tika and point out the problematic parts.  We do quite a bit before the 
entities get to boilerpipe...I’m not yet convinced from the report that this 
affects us. I’m completely willing to believe it does, though, with a concrete 
example. Thank you!

> Security Vulnerability in boilerpipe (CVE-2018-16481)
> -----------------------------------------------------
>
>                 Key: TIKA-2829
>                 URL: https://issues.apache.org/jira/browse/TIKA-2829
>             Project: Tika
>          Issue Type: Bug
>          Components: parser
>    Affects Versions: 1.20
>            Reporter: Alex LI
>            Priority: Major
>
> org.apache.tika:tika-parsers:1.20 depending on boilerpipe, which the 
> dependency reflections uses.
> [https://nvd.nist.gov/vuln/detail/CVE-2018-16481]
> h3. Current Description
> A XSS vulnerability was found in html-page <=2.1.1 that allows malicious 
> Javascript code to be executed in the user's browser due to the absence of 
> sanitization of the paths before rendering.
> ==========================
> [info] de.l3s.boilerpipe:boilerpipe:1.1.0
> [info]   +-org.apache.tika:tika-parsers:1.20



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to