![]() |
|
Message-ID: <20250821075106.64dd7887@hboeck.de> Date: Thu, 21 Aug 2025 07:51:06 +0200 From: Hanno Böck <hanno@...eck.de> To: oss-security@...ts.openwall.com Subject: Re: CVE-2025-54988: Apache Tika PDF parser module: XXE vulnerability in PDFParser's handling of XFA On Wed, 20 Aug 2025 15:45:33 -0400 Tim Allison <tallison@...che.org> wrote: > Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika Probably this commit: https://github.com/apache/tika/commit/bfee6d5569fe9197c4ea947a96e212825184ca33 I recently looked into XXE vulnerabilities, and I believe this is primarily a vulnerabiltiy in Java's standard library, not in any single piece of software. I also consider it to be a flaw in the XML spec itself. XXE vulnerabilities are a well-known problem, and overwhelmingly, XML libraries and APIs have adopted safer defaults, which is the right thing to address this. Java is the exception, where XML parsing is still insecure-by-default. (That XXE and other XML security flaws aren't addressed in the XML spec itself is also a problem.) The idea that any parsing of an untrusted XML file automatically opens a can of security vulnerability worms, and expecting that every software using an XML parsing API has to do something extra to avoid it is an absurd security footgun. -- Hanno Böck - Independent security researcher https://itsec.hboeck.de/ https://badkeys.info/
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.