[
https://issues.apache.org/jira/browse/TIKA-1968?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15275775#comment-15275775
]
Nick Burch commented on TIKA-1968:
----------------------------------
Those classes are designed to call out to external programs, so it may just be
false positives
Not sure we'd be doing a patched version of 1.9 either way, so probably best if
you could re-test with the 1.13 release candidate, and also verify if those are
false positives or not?
> Veracode static scan reports 3 very high OS Command injections in
> tika-core-1.9.jar
> -----------------------------------------------------------------------------------
>
> Key: TIKA-1968
> URL: https://issues.apache.org/jira/browse/TIKA-1968
> Project: Tika
> Issue Type: Bug
> Affects Versions: 1.9
> Reporter: I-Min Mau
> Assignee: Tim Allison
>
> We had specifically upgraded the tika jar we use in our Pipe application to
> tika-core-1.9.jar, but Veracode static scan still reports the following 3 OS
> command injection flaws:
> 17589 176 - tika-core-1.9.jar org/.../ExternalEmbedder.java 367 4/23/16
> 17595 177 - tika-core-1.9.jar org/.../ExternalParser.java 178 4/23/16
> 17593 177 - tika-core-1.9.jar org/.../ExternalParser.java 180 4/23/16
> Requesting fix in higher version and/or help us remediate so we can pass our
> corporate security reports, thanks!
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)