Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.
mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%[email protected]%3E
packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html
rhn.redhat.com/errata/RHSA-2017-0179.html
rhn.redhat.com/errata/RHSA-2017-0248.html
rhn.redhat.com/errata/RHSA-2017-0249.html
rhn.redhat.com/errata/RHSA-2017-0272.html
svn.apache.org/viewvc?view=revision&revision=1739564
svn.apache.org/viewvc?view=revision&revision=1739565
www.debian.org/security/2016/dsa-3606
www.securityfocus.com/archive/1/538503/100/0/threaded
www.securityfocus.com/bid/90902
github.com/advisories/GHSA-4c32-xmgj-2g98
lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54@%3Ccommits.tika.apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2016-2175