From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2018-1335 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 8.8 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Platform | Package | State |
---|---|---|
Red Hat Software Collections for Red Hat Enterprise Linux | rh-eclipse46-tika | Not affected |
Red Hat Satellite 5 | tika | Will not fix |
Red Hat JBoss Fuse Service Works 6 | tika-core | Not affected |
Red Hat JBoss Fuse 7 | camel-tika | Not affected |
Red Hat JBoss Data Virtualization 6 | tika-core | Affected |
Red Hat JBoss BRMS 6 | tika-core | Will not fix |
Red Hat JBoss BRMS 5 | tika-core | Will not fix |
Red Hat JBoss BPMS 6 | tika-core | Will not fix |