[ 
https://issues.apache.org/jira/browse/TIKA-1968?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15280055#comment-15280055
 ] 

Tim Allison commented on TIKA-1968:
-----------------------------------

Not sure why this was assigned to me.  Back in 1.9, those lines in 
ExternalParser were:

{noformat}
                process = Runtime.getRuntime().exec( cmd[0] );
            } else {
                process = Runtime.getRuntime().exec( cmd );
{noformat}

I agree with Nick; I'm not sure this is a bug, likely a false positive.  I 
suspect you'll get the same error in 1.13 with different line numbers, and in 
fact, you'll probably get quite a few more because we've added a number of 
parsers that make system calls.

If this is a problem, can you recommend a remediation?

> Veracode static scan reports 3 very high OS Command injections in 
> tika-core-1.9.jar
> -----------------------------------------------------------------------------------
>
>                 Key: TIKA-1968
>                 URL: https://issues.apache.org/jira/browse/TIKA-1968
>             Project: Tika
>          Issue Type: Bug
>    Affects Versions: 1.9
>            Reporter: I-Min Mau
>
> We had specifically upgraded the tika jar we use in our Pipe application to 
> tika-core-1.9.jar, but Veracode static scan still reports the following 3 OS 
> command injection flaws:
> 17589 176 - tika-core-1.9.jar org/.../ExternalEmbedder.java 367 4/23/16
> 17595 177 - tika-core-1.9.jar org/.../ExternalParser.java 178 4/23/16
> 17593 177 - tika-core-1.9.jar org/.../ExternalParser.java 180 4/23/16
> Requesting fix in higher version and/or help us remediate so we can pass our 
> corporate security reports, thanks!  



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to