Home / os / win7

Apache Tika 1.13 Code Execution

Posted on 30 November -0001

<HTML><HEAD><TITLE>Apache Tika 1.13 Code Execution</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>CVE-2016-6809 a Arbitrary Code Execution Vulnerability in Apache Tikaas MATLAB Parser Severity: Important Vendor: The Apache Software Foundation Versions Affected: 1.6-1.13 Description: Apache Tika wraps the jmatio parser (https://github.com/gradusnikov/jmatio) to handle MATLAB files. The parser uses native deserialization on serialized Java objects embedded in MATLAB files. A malicious user could inject arbitrary code into a MATLAB file that would be executed when the object is deserialized. Mitigation: Turn off MATLAB file parsing or upgrade to Tika 1.14. Credit: Pierre Ernst of salesforce.com discovered this issue and contributed to the fix. </BODY></HTML>

 

TOP