[
https://issues.apache.org/jira/browse/TIKA-1968?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15280055#comment-15280055
]
Tim Allison commented on TIKA-1968:
-----------------------------------
Not sure why this was assigned to me. Back in 1.9, those lines in
ExternalParser were:
{noformat}
process = Runtime.getRuntime().exec( cmd[0] );
} else {
process = Runtime.getRuntime().exec( cmd );
{noformat}
I agree with Nick; I'm not sure this is a bug, likely a false positive. I
suspect you'll get the same error in 1.13 with different line numbers, and in
fact, you'll probably get quite a few more because we've added a number of
parsers that make system calls.
If this is a problem, can you recommend a remediation?
> Veracode static scan reports 3 very high OS Command injections in
> tika-core-1.9.jar
> -----------------------------------------------------------------------------------
>
> Key: TIKA-1968
> URL: https://issues.apache.org/jira/browse/TIKA-1968
> Project: Tika
> Issue Type: Bug
> Affects Versions: 1.9
> Reporter: I-Min Mau
>
> We had specifically upgraded the tika jar we use in our Pipe application to
> tika-core-1.9.jar, but Veracode static scan still reports the following 3 OS
> command injection flaws:
> 17589 176 - tika-core-1.9.jar org/.../ExternalEmbedder.java 367 4/23/16
> 17595 177 - tika-core-1.9.jar org/.../ExternalParser.java 178 4/23/16
> 17593 177 - tika-core-1.9.jar org/.../ExternalParser.java 180 4/23/16
> Requesting fix in higher version and/or help us remediate so we can pass our
> corporate security reports, thanks!
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)