We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-6138 | We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3. |
![]() |
GHSA-qw3f-w4pf-jh5f | Regular expression denial of service in apache tika |
![]() |
USN-7529-1 | Apache Tika vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
Avoid using the StandardsExtractingContentHandler or upgrade to Tika 1.28.3 or 2.4.0
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T07:03:40.228Z
Reserved: 2022-05-17T00:00:00
Link: CVE-2022-30973

No data.

Status : Modified
Published: 2022-05-31T14:15:07.897
Modified: 2024-11-21T07:03:39.357
Link: CVE-2022-30973


No data.