We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-6138 We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Github GHSA Github GHSA GHSA-qw3f-w4pf-jh5f Regular expression denial of service in apache tika
Ubuntu USN Ubuntu USN USN-7529-1 Apache Tika vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Avoid using the StandardsExtractingContentHandler or upgrade to Tika 1.28.3 or 2.4.0

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T07:03:40.228Z

Reserved: 2022-05-17T00:00:00

Link: CVE-2022-30973

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-31T14:15:07.897

Modified: 2024-11-21T07:03:39.357

Link: CVE-2022-30973

cve-icon Redhat

Severity : Low

Publid Date: 2022-05-31T00:00:00Z

Links: CVE-2022-30973 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses