This Metasploit module exploits a command injection vulnerability in Apache Tika versions 1.15 through 1.17 on Windows. A file with the image/jp2 content-type is used to bypass magic byte checking. When OCR is specified in the request, parameters can be passed to change the parameters passed at command line to allow for arbitrary JScript to execute. A JScript stub is passed to execute arbitrary code. This module was verified against version 1.15 through 1.17 on Windows 2012. While the CVE and finding show more versions vulnerable, during testing it was determined only versions greater than 1.14 were exploitable due to jp2 support being added.
1d10dcd077954ec22984a947fb2e56ca4e13c135682dadd44362021acac47063
Apache Axis version 1.4 suffers from a remote code execution vulnerability.
43fdbd4445757874d097a1fddc91c93ec8a4d38cfb81f1581551cc008f2f8b94
Apache Tika Server versions prior to 1.18 suffer from a command injection vulnerability.
3e510c9ef27c350819032001fc731ccd140c0a63546f55368644de170fc5fdb0