{"id":"UBUNTU-CVE-2018-1335","details":"From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.","modified":"2026-04-27T15:41:30.068562Z","published":"2018-04-25T21:29:00Z","upstream":["CVE-2018-1335"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1335"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2018/04/25/8"},{"type":"REPORT","url":"https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@%3Cdev.tika.apache.org%3E"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-1335"}],"affected":[{"package":{"name":"tika","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/tika@1.22-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.22-2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.22-2","binary_name":"libtika-java"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1335.json"}},{"package":{"name":"tika","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/tika@1.22-2?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.22-2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.22-2","binary_name":"libtika-java"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1335.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}