[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Apache Tika 1.13 Code Execution Vulnerability

Author
Pierre Ernst
Risk
[
Security Risk High
]
0day-ID
0day-ID-26307
Category
remote exploits
Date add
11-11-2016
CVE
CVE-2016-6809
Platform
java
CVE-2016-6809 a Arbitrary Code Execution Vulnerability in Apache Tikaas MATLAB Parser 

Severity: Important 

Vendor: The Apache Software Foundation 

Versions Affected: 1.6-1.13 

Description: Apache Tika wraps the jmatio parser (https://github.com/gradusnikov/jmatio) to handle MATLAB files.  The parser uses native deserialization on serialized Java objects embedded in MATLAB files. A malicious user could inject arbitrary code into a MATLAB file that would be executed when the object is deserialized. 

Mitigation: Turn off MATLAB file parsing or upgrade to Tika 1.14. 

Credit: Pierre Ernst of salesforce.com discovered this issue and contributed to the fix.

#  0day.today [2024-06-30]  #