Uploaded image for project: 'Tika'
  1. Tika
  2. TIKA-2499

Sonatype Nexus Auditor is reporting that Tika 1.13 is using a number of vulnerable Third party components.

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Blocker
    • Resolution: Fixed
    • 1.13
    • 1.17
    • None

    Description

      Sonatype Nexus Auditor is reporting that Tika 1.13 is using a number of vulnerable Third party components.

      Sr No Vulnerability ID Description from Nexus Auditor Vulnerable Third party component Fixed Third party component

      1 SONATYPE-2017-0355 Source Sonatype Data Research
      Severity Sonatype CVSS 3.0: 7.5
      Weakness Sonatype CWE: 20

      Explanation
      jackson-core is vulnerable to Denial of Service (DoS). The _reportInvalidToken() function in the UTF8StreamJsonParser and ReaderBasedJsonParser classes allows large amounts of extraneous data to be printed to the server log. An attacker can exploit this vulnerability by crafting a POST request containing large amounts of data. When the data contains invalid JSON, an exception is thrown, which results in the consumption of available disk space when the error message is written to server.log along with the request data.
      Detection
      The application is vulnerable by using this component.
      Recommendation
      We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
      Categories
      Data
      Root Cause
      tika-app-1.13.jar <= ReaderBasedJsonParser.class : [2.0.0-RC1, 2.8.6)
      tika-app-1.13.jar <= UTF8StreamJsonParser.class : [2.0.0-RC1, 2.8.6)
      Advisories
      Attack: https://issues.jboss.org/browse/JBEAP-6316
      Project: https://github.com/FasterXML/jackson-core/pull/322
      Jackson
      Fixed version: Jackson 2.8.6 or later

      2 SONATYPE-2017-0359 Source Sonatype Data Research
      Severity Sonatype CVSS 3.0: 7.5
      Weakness Sonatype CWE: 22

      Explanation
      The Apache httpcomponents component is vulnerable to Directory Traversal. The normalizePath() function in the URIBuilder class allows directory traversal characters such as ../. An attacker can exploit this vulnerability by sending a specially crafted request containing this sequence in the URL path, allowing the attacker to traverse beyond the allowed directory and retrieve the contents of arbitrary files from the server, leading to information disclosure.
      Detection
      The application is vulnerable by using this component.
      Recommendation
      We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
      Categories
      Data
      Root Cause
      tika-app-1.13.jar <= URIBuilder.class : [4.2.1-RC1, 4.5.3)
      Advisories
      Project: https://issues.apache.org/jira/browse/HTTPCLIENT-1803
      Apache httpcomponents
      Fixed Version: Apache httpcomponents 4.5.3 or later

      3 CVE-2017-12620 Issue CVE-2017-12620
      Source National Vulnerability Database
      Severity Sonatype CVSS 3.0: 7.3
      Weakness Sonatype CWE: 611

      Description from CVE
      When loading models or dictionaries that contain XML it is possible to perform an XXE attack, since Apache OpenNLP is a library, this only affects applications that load models or dictionaries from untrusted sources. The versions 1.5.0 to 1.5.3, 1.6.0, 1.7.0 to 1.7.2, 1.8.0 to 1.8.1 of Apache OpenNLP are affected.
      Explanation
      Apache OpenNLP is vulnerable to XML External Entity (XXE) attack. The constructor in the ConstitParseSampleStream class, createDOM() function in the GeneratorFactory class, and the parse() function in the IrishSentenceBankDocument and LetsmtDocument classes allows unsafe external entities when processing XML data from models and dictionaries. A remote attacker can exploit this by submitting specially crafted XML, which can potentially lead to Denial of Service, Information Disclosure, or other attacks.
      Advisory Deviation Notice
      The Sonatype security research team discovered that the vulnerability is present in version 1.5.2-incubating-rc1 until 1.8.2, not in all the versions from 1.5.0 till 1.8.2 as the advisory states.
      Detection
      The application is vulnerable by using this component.
      Recommendation
      We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
      Categories
      Data
      Root Cause
      tika-bundle-1.13.jar <= opennlp-tools-1.5.3.jar <= ConstitParseSampleStream.class : [1.5.3-rc1, 1.7.1)
      tika-bundle-1.13.jar <= opennlp-tools-1.5.3.jar <= GeneratorFactory.class : [1.5.3-rc1, 1.7.1)
      Advisories
      Project: http://opennlp.apache.org/news/cve-2017-12620.html
      Close
      Apache OpenNLP
      Fixed version: Apache OpenNLP 1.8.2 or later

      4 SONATYPE-2016-0398 Source Sonatype Data Research
      Severity Sonatype CVSS 3.0: 7.5
      Weakness Sonatype CWE: 22

      Explanation
      Plexus Utils is vulnerable to Directory Traversal. The extractFile() function in the Expand class allows directory traversal characters such as ../ via the entryName parameter. An attacker can exploit this vulnerability by sending a specially crafted request containing this sequence in the URL path, allowing the attacker to traverse beyond the allowed directory and retrieve the contents of arbitrary files from the server, leading to information disclosure.
      Detection
      The application is vulnerable by using this component.
      Recommendation
      We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
      Categories
      Data
      Root Cause
      tika-app-1.13.jar <= Expand.class : ( , 3.0.24)
      Advisories
      Third Party: https://github.com/sonatype/plexus-utils/issues/20
      Plexus Utils
      Fixed version: Most likely Plexus Utils 3.0.24 or later

      Can we please have Apach Tika release an updated version that uses the fixed Third party components?

      Thx & Regards.
      — Abhijit Rajwade
      BMC Software

      Attachments

        Activity

          People

            tallison Tim Allison
            arajwade Abhijit Rajwade
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: