vendor:
Tika
by:
h00die, David Yesland, Tim Allison
8.1
CVSS
HIGH
Command Injection
78
CWE
Product Name: Tika
Affected Version From: 1.15
Affected Version To: 1.17
Patch Exists: YES
Related CWE: CVE-2018-1335
CPE: a:apache:tika
Tags: packetstorm,edb,cve,cve2018,apache,tika,rce,intrusive
CVSS Metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/, https://www.exploit-db.com/exploits/47208, https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@dev.tika.apache.org, https://nvd.nist.gov/vuln/detail/CVE-2018-1335, http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html
Nuclei Metadata: {'max-request': 1, 'vendor': 'apache', 'product': 'tika'}
Platforms Tested: Windows
2018
Apache Tika Header Command Injection
This module exploits a command injection vulnerability in Apache Tika 1.15 - 1.17 on Windows. A file with the image/jp2 content-type is used to bypass magic bytes checking. When OCR is specified in the request, parameters can be passed to change the parameters passed at command line to allow for arbitrary JScript to execute. A JScript stub is passed to execute arbitrary code. This module was verified against version 1.15 - 1.17 on Windows 2012. While the CVE and finding show more versions vulnerable, during testing it was determined only > 1.14 was exploitable due to jp2 support being added.
Mitigation:
Update to a version of Apache Tika that is not vulnerable to command injection.