Potential File Overwrite Vulnerability in Apache Tika by The Apache Software Foundation
CVE-2018-11762

5.9MEDIUM

Key Information:

Vendor
Apache
Vendor
CVE Published:
19 September 2018

Summary

Apache Tika versions 0.9 to 1.18 are susceptible to a vulnerability that can be exploited when the user fails to specify an extract directory on the command line. If the input file includes an embedded file with an absolute path (e.g., "C:/evil.bat"), the tika-app utility may overwrite the targeted file, leading to unintended consequences. This behavior poses a significant risk, particularly for users who may inadvertently allow attackers to replace critical files on their systems.

Affected Version(s)

Apache Tika 0.9 to 1.18

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.