{"containers":{"cna":{"affected":[{"product":"Apache Tika","vendor":"Apache Software Foundation","versions":[{"status":"affected","version":"Apache Tomcat 0.1 to 1.19"}]}],"datePublic":"2018-10-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later."}],"problemTypes":[{"descriptions":[{"description":"Denial of Service Vulnerability","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-11-14T23:07:10.000Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"name":"105585","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/105585"},{"tags":["x_refsource_CONFIRM"],"url":"https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05%40%3Cdev.tika.apache.org%3E"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20190903-0002/"},{"name":"RHSA-2019:3892","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:3892"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","DATE_PUBLIC":"2018-10-09T00:00:00","ID":"CVE-2018-11796","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache Tika","version":{"version_data":[{"version_value":"Apache Tomcat 0.1 to 1.19"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Denial of Service Vulnerability"}]}]},"references":{"reference_data":[{"name":"105585","refsource":"BID","url":"http://www.securityfocus.com/bid/105585"},{"name":"https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E","refsource":"CONFIRM","url":"https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E"},{"name":"https://security.netapp.com/advisory/ntap-20190903-0002/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20190903-0002/"},{"name":"RHSA-2019:3892","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:3892"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T08:17:09.143Z"},"title":"CVE Program Container","references":[{"name":"105585","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/105585"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05%40%3Cdev.tika.apache.org%3E"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20190903-0002/"},{"name":"RHSA-2019:3892","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:3892"}]}]},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2018-11796","datePublished":"2018-10-09T22:00:00.000Z","dateReserved":"2018-06-05T00:00:00.000Z","dateUpdated":"2024-09-16T18:19:51.122Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}