We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6138 | We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3. |
Github GHSA |
GHSA-qw3f-w4pf-jh5f | Regular expression denial of service in apache tika |
Ubuntu USN |
USN-7529-1 | Apache Tika vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
Avoid using the StandardsExtractingContentHandler or upgrade to Tika 1.28.3 or 2.4.0
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T07:03:40.228Z
Reserved: 2022-05-17T00:00:00
Link: CVE-2022-30973
No data.
Status : Modified
Published: 2022-05-31T14:15:07.897
Modified: 2024-11-21T07:03:39.357
Link: CVE-2022-30973
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA
Ubuntu USN