Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.
mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8%40apache.org%3E
packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html
rhn.redhat.com/errata/RHSA-2017-0179.html
rhn.redhat.com/errata/RHSA-2017-0248.html
rhn.redhat.com/errata/RHSA-2017-0249.html
rhn.redhat.com/errata/RHSA-2017-0272.html
svn.apache.org/viewvc?view=revision&revision=1739564
svn.apache.org/viewvc?view=revision&revision=1739565
www.debian.org/security/2016/dsa-3606
www.securityfocus.com/archive/1/538503/100/0/threaded
www.securityfocus.com/bid/90902
lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54%40%3Ccommits.tika.apache.org%3E