The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
poi.apache.org/changes.html
rhn.redhat.com/errata/RHSA-2014-1370.html
rhn.redhat.com/errata/RHSA-2014-1398.html
rhn.redhat.com/errata/RHSA-2014-1399.html
rhn.redhat.com/errata/RHSA-2014-1400.html
secunia.com/advisories/59943
secunia.com/advisories/60419
secunia.com/advisories/61766
www-01.ibm.com/support/docview.wss?uid=swg21996759
www.apache.org/dist/poi/release/RELEASE-NOTES.txt
www.securityfocus.com/bid/69647
www.securityfocus.com/bid/78018
exchange.xforce.ibmcloud.com/vulnerabilities/95770
lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations