|
Message-ID: <CAC1dCwVx2Z1haCnvYBhH7nQRN4kYKjwkLfjsCbeFHv2tRcBonA@mail.gmail.com> Date: Wed, 19 Sep 2018 08:44:41 -0400 From: Tim Allison <tallison@...che.org> To: dev@...a.apache.org, user@...a.apache.org, announce@...che.org, Apache Security Team <security@...che.org>, oss-security@...ts.openwall.com Subject: [CVE-2018-11761] Apache Tika DoS XML Entity Expansion Vulnerability CVE-2018-11761: Apache Tika Denial of Service via XML Entity Expansion Vulnerability Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Apache Tika 0.1 to 1.18 Description: Apache Tika's XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack. Mitigation: Apache Tika users should upgrade to 1.19 or later Credit: This issue was discovered by Renfei (Brian) Wang of Amazon.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.