Vulnerability Details CVE-2018-11796
In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.034
EPSS Ranking 86.8%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2018-11796
-
cpe:2.3:a:apache:tika:0.1
-
cpe:2.3:a:apache:tika:0.10
-
cpe:2.3:a:apache:tika:0.2
-
cpe:2.3:a:apache:tika:0.3
-
cpe:2.3:a:apache:tika:0.4
-
cpe:2.3:a:apache:tika:0.5
-
cpe:2.3:a:apache:tika:0.6
-
cpe:2.3:a:apache:tika:0.7
-
cpe:2.3:a:apache:tika:0.8
-
cpe:2.3:a:apache:tika:0.9
-
cpe:2.3:a:apache:tika:1.0
-
cpe:2.3:a:apache:tika:1.1
-
cpe:2.3:a:apache:tika:1.10
-
cpe:2.3:a:apache:tika:1.11
-
cpe:2.3:a:apache:tika:1.12
-
cpe:2.3:a:apache:tika:1.13
-
cpe:2.3:a:apache:tika:1.14
-
cpe:2.3:a:apache:tika:1.15
-
cpe:2.3:a:apache:tika:1.16
-
cpe:2.3:a:apache:tika:1.17
-
cpe:2.3:a:apache:tika:1.18
-
cpe:2.3:a:apache:tika:1.19
-
cpe:2.3:a:apache:tika:1.2
-
cpe:2.3:a:apache:tika:1.3
-
cpe:2.3:a:apache:tika:1.4
-
cpe:2.3:a:apache:tika:1.5
-
cpe:2.3:a:apache:tika:1.6
-
cpe:2.3:a:apache:tika:1.7
-
cpe:2.3:a:apache:tika:1.8
-
cpe:2.3:a:apache:tika:1.9