Deserialization of Untrusted Data in Apache Tika (CVE-2016-6809) 

Issue date: 26-04-2018
Affects versions: 12.2, 11.2, 10.2

Issue ID: SECURITY-32

Affected Product Version(s)
This vulnerability affects all versions of both CMS and delivery applications based on Hippo CMS prior to 12.3.0, 12.2.1, 11.2.7, and 10.2.11.

Severity 
high

Description

Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files.
The issue exists because Tika invokes JMatIO to do native deserialization. See: CVE-2016-6809

This vulnerability is classified with severity high, and may (also) apply to project specific usages of the Apache Tika library within a Hippo CMS project. 

The Apache Tika version in all supported CMS maintenance versions 10.2.11, 11.2.7, 12.2.1, and 12.3.0 has been updated to version 1.17.

Instructions

Every CMS customer is strongly advised to upgrade as soon as possible to the latest CMS maintenance release as indicated above, or higher.

Because the upgrade for these CMS maintenance versions may require some additonal steps and verification, specific upgrade documentation is available to our customers for upgrading to version 10.2.11, 11.2.7, or to 12.2.1 and 12.3.0 (login required).