Bug 1632469 (CVE-2018-11762)

Summary: CVE-2018-11762 tika: Zip Slip vulnerability in tika-app
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abergmann, aileenc, alazarot, anstephe, bkearney, cbuissar, chazlett, drieden, etirelli, gvarsami, hhorak, ibek, java-sig-commits, jcoleman, jolee, jorton, jschatte, jstastny, kconner, krathod, kverlaen, ldimaggi, lef, meissner, nwallace, paradhya, puntogil, rrajasek, rsynek, rwagner, rzhang, sdaley, tcunning, tkirby, tlestach, vhalbert
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: tika 1.19 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-12-10 01:24:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1632470    
Bug Blocks: 1632464    

Description Laura Pardo 2018-09-24 20:52:52 UTC
A flaw was found in Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.


References:
https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E
https://seclists.org/oss-sec/2018/q3/256

Comment 1 Laura Pardo 2018-09-24 20:53:10 UTC
Created tika tracking bugs for this issue:

Affects: fedora-all [bug 1632470]

Comment 3 Tomas Hoger 2018-10-04 07:53:26 UTC
The tika packages as shipped as part of the Eclipse collections do not include tika-app and are therefore unaffected by this issue.

Comment 6 Cedric Buissart 2018-11-07 10:07:21 UTC
Red Hat Satellite 5 does not ship the vulnerable code, and thus is not affected by this flaw.

Comment 10 Product Security DevOps Team 2019-12-10 01:24:07 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-11762