CVE-2018-11762 – org.apache.tika:tika-core
Package
Manager: maven
Name: org.apache.tika:tika-core
Vulnerable Version: >=0.9 <1.19
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01532 pctl0.8063
Details
Moderate severity vulnerability that affects org.apache.tika:tika-core In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.
Metadata
Created: 2018-10-17T15:49:58Z
Modified: 2021-09-21T17:58:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-w6g3-v46q-5p28/GHSA-w6g3-v46q-5p28.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-w6g3-v46q-5p28
Finding: F063
Auto approve: 1