Potential File Overwrite Vulnerability in Apache Tika by The Apache Software Foundation
CVE-2018-11762
5.9MEDIUM
Summary
Apache Tika versions 0.9 to 1.18 are susceptible to a vulnerability that can be exploited when the user fails to specify an extract directory on the command line. If the input file includes an embedded file with an absolute path (e.g., "C:/evil.bat"), the tika-app utility may overwrite the targeted file, leading to unintended consequences. This behavior poses a significant risk, particularly for users who may inadvertently allow attackers to replace critical files on their systems.
Affected Version(s)
Apache Tika 0.9 to 1.18
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved