[ 
https://issues.apache.org/jira/browse/TIKA-2952?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16941113#comment-16941113
 ] 

Tim Allison commented on TIKA-2952:
-----------------------------------

I haven't had the time to dig into this thoroughly.  I suspect that this might 
affect Tika.

One of the big problems is that even if metadata-extractor were released with 
this fix, the more recent underlying Adobe xmpcore libraries have changed the 
namespace to com.adobe.internal.*  So, we'd break a bunch of stuff in our xmp 
module and elsewhere. I found this when I tried to upgrade to 2.12.0 before our 
last release.

In order for this to be fixed correctly, we'd have to find someone at Adobe to 
release their external package named code: com.adobe.*, and then have 
metadata-extractor upgrade to that.

Any fellow devs see a better option?

In general, Tika cannot rely on robustness of underlying parsers, and we 
encourage separation of parsing into a different process/jvm than your main 
code, whether that's through tika-server with -spawn-child mode or using the 
ForkParser or using Tika app in batch mode.

That said, we try to do everything we can to fix and upgrade as necessary for 
more robust code.

> Vulnerable "metadata-extractor 2.11.0" is present in tika 1.22.
> ---------------------------------------------------------------
>
>                 Key: TIKA-2952
>                 URL: https://issues.apache.org/jira/browse/TIKA-2952
>             Project: Tika
>          Issue Type: Bug
>            Reporter: Aman Mishra
>            Priority: Major
>
> We can see that metadata-extractor with version 2.11.0 is present in 
> tika-bundle 1.22 jar. We can see that even latest metadata-extractor with 
> version 2.12.0 is also vulnerable.
>  
> So please confirm your side that "Is this vulnerability [CVE-2019-14262] is 
> impacting to tika or not ?"



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to