VYPR
High severityNVD Advisory· Published Apr 25, 2018· Updated Sep 17, 2024

CVE-2018-1335

CVE-2018-1335

Description

From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Tika 1.7–1.17 tika-server is vulnerable to command injection via crafted HTTP headers, enabling remote code execution.

Vulnerability

From Apache Tika versions 1.7 to 1.17, the tika-server component can be exploited by sending carefully crafted HTTP headers. The server uses these headers in command-line invocations without proper sanitization, allowing an attacker to inject arbitrary operating system commands. This vulnerability only affects deployments where tika-server is exposed to untrusted clients. The affected versions are 1.7 through 1.17 [2][4].

Exploitation

An attacker must be able to send HTTP requests to the tika-server instance. No authentication is required if the server is exposed to untrusted networks. The attacker crafts specific headers that, when processed by the server, are injected into command-line arguments passed to underlying operating system utilities. The exact sequence involves sending a malicious request with crafted header values that break out of the intended argument and append arbitrary commands [1].

Impact

Successful exploitation allows the attacker to execute arbitrary commands on the server with the privileges of the Tika process. This leads to full remote code execution (RCE), enabling compromise of the host system's confidentiality, integrity, and availability [2][3].

Mitigation

Upgrading to Apache Tika 1.18 or later resolves the vulnerability [2][4]. Red Hat released an advisory (RHSA-2019:3140) for Red Hat JBoss Data Virtualization 6.4.8, which includes the fix [3]. No workarounds are documented for deployments that cannot immediately upgrade; the only secure option is to restrict network access to tika-server until the patch is applied.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.tika:tika-coreMaven
>= 1.7, < 1.181.18

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.