[ 
https://issues.apache.org/jira/browse/TIKA-3053?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Moritz closed TIKA-3053.
--------------------------------
    Resolution: Fixed

Wrongly reported

> Denial of Service (DoS) in org.apache.cxf:cxf-core 3.3.2
> --------------------------------------------------------
>
>                 Key: TIKA-3053
>                 URL: https://issues.apache.org/jira/browse/TIKA-3053
>             Project: Tika
>          Issue Type: Bug
>    Affects Versions: 1.23
>            Reporter: Michael Moritz
>            Priority: Major
>
> This issue has been created automatically by a source code scanner
> ## Third party component with known security vulnerabilities
> ent-search-master/script/vendor_jars > Jars.lock > 
> org.apache.cxf:[email protected]
> ## Overview
> [org.apache.cxf:cxf-core](https://github.com/apache/cxf) is a an open source 
> services framework. CXF helps you build and develop services using frontend 
> programming APIs, like JAX-WS and JAX-RS.
> Affected versions of this package are vulnerable to Denial of Service (DoS).
> Apache CXF does not restrict the number of message attachments present in a 
> given message. This leaves open the possibility of a denial of service type 
> attack, where a malicious user crafts a message containing a very large 
> number of message attachments.
> ## Details
> Denial of Service (DoS) describes a family of attacks, all aimed at making a 
> system inaccessible to its intended and legitimate users.
> Unlike other vulnerabilities, DoS attacks usually do not aim at breaching 
> security. Rather, they are focused on making websites and services 
> unavailable to genuine users resulting in downtime.
> One popular Denial of Service vulnerability is DDoS (a Distributed Denial of 
> Service), an attack that attempts to clog network pipes to the system by 
> generating a large volume of traffic from many machines.
> When it comes to open source libraries, DoS vulnerabilities allow attackers 
> to trigger such a crash or crippling of the service by using a flaw either in 
> the application code or from the use of open source libraries.
> Two common types of DoS vulnerabilities:
> * High CPU/Memory Consumption- An attacker sending crafted requests that 
> could cause the system to take a disproportionate amount of time to process. 
> For example, 
> [commons-fileupload:commons-fileupload](SNYK-JAVA-COMMONSFILEUPLOAD-30082).
> * Crash - An attacker sending crafted requests that could cause the system to 
> crash. For Example,  [npm `ws` package](npm:ws:20171108)
> ## Remediation
> Upgrade `org.apache.cxf:cxf-core` to version 3.3.4, 3.2.11 or higher.
> ## References
> - [CXF Security 
> Advisory](http://cxf.apache.org/security-advisories.data/CVE-2019-12406.txt.asc)
> - 
> [SNYK-JAVA-ORGAPACHECXF-480439](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECXF-480439)



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to