Vulnerabilities > CVE-2016-6809 - Deserialization of Untrusted Data vulnerability in Apache Nutch and Tika
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2018-639385F5EC.NASL |
description | Update to newer release of Tika including security fixes for CVE-2016-4434 and CVE-2016-6809. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-05 |
modified | 2019-01-03 |
plugin id | 120477 |
published | 2019-01-03 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/120477 |
title | Fedora 28 : tika (2018-639385f5ec) |
Seebug
bulletinFamily | exploit |
description | No description provided by source. |
id | SSV:92547 |
last seen | 2017-11-19 |
modified | 2016-11-22 |
published | 2016-11-22 |
reporter | fizz |
title | Apache Tika remote code execution vulnerability(CVE-2016-6809) |
References
- http://seclists.org/bugtraq/2016/Nov/40
- http://seclists.org/bugtraq/2016/Nov/40
- http://www.securityfocus.com/bid/94247
- http://www.securityfocus.com/bid/94247
- https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt
- https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt
- https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a%40%3Cdev.nutch.apache.org%3E
- https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a%40%3Cdev.nutch.apache.org%3E
- https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9%40%3Cuser.nutch.apache.org%3E
- https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9%40%3Cuser.nutch.apache.org%3E
- https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78%40%3Cdev.lucene.apache.org%3E
- https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78%40%3Cdev.lucene.apache.org%3E
- https://lists.apache.org/thread.html/r2f6f6c130b12b7332f323f74d031072b1517065ce28a22346791ffb6%40%3Cissues.lucene.apache.org%3E
- https://lists.apache.org/thread.html/r2f6f6c130b12b7332f323f74d031072b1517065ce28a22346791ffb6%40%3Cissues.lucene.apache.org%3E
- https://lists.apache.org/thread.html/rfd3646bb724b66b1a9ddef69e692da2b7a727a8799551c78eedf0a0f%40%3Cissues.lucene.apache.org%3E
- https://lists.apache.org/thread.html/rfd3646bb724b66b1a9ddef69e692da2b7a727a8799551c78eedf0a0f%40%3Cissues.lucene.apache.org%3E