{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T03:17:35.353","vulnerabilities":[{"cve":{"id":"CVE-2018-11796","sourceIdentifier":"security@apache.org","published":"2018-10-09T22:29:00.393","lastModified":"2024-11-21T03:44:03.093","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later."},{"lang":"es","value":"En Apache Tika 1.19 (CVE-2018-11761), se ha añadido un límite de expansión de entidades para el análisis XML. Sin embargo, Tika reutiliza SAXParsers y llama a reset() tras cada análisis y, en el caso de los analizadores Xerces2, tal y como se indica en la documentación, elimina el SecurityManager especificado por el usuario y elimina los límites de expansión de entidades tras el primer análisis. Por lo tanto, las versiones de la 0.1 a la 1.19 de Apache Tika siguen siendo vulnerables a expansiones de entidades, lo que podría conducir a un ataque de denegación de servicio (DoS). Los usuarios deberían actualizar a la versión 1.19.1 o posteriores."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*","versionStartIncluding":"0.1","versionEndIncluding":"1.19","matchCriteriaId":"889B834A-0580-4075-8953-4EAA88DDEACF"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105585","source":"security@apache.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2019:3892","source":"security@apache.org"},{"url":"https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05%40%3Cdev.tika.apache.org%3E","source":"security@apache.org"},{"url":"https://security.netapp.com/advisory/ntap-20190903-0002/","source":"security@apache.org"},{"url":"http://www.securityfocus.com/bid/105585","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2019:3892","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05%40%3Cdev.tika.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20190903-0002/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}