Description
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
No analysis available yet.
Remediation
Vendor Workaround
Avoid using the StandardsExtractingContentHandler or upgrade to Tika 1.28.3 or 2.4.0
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6138 | We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3. |
Github GHSA |
GHSA-qw3f-w4pf-jh5f | Regular expression denial of service in apache tika |
Ubuntu USN |
USN-7529-1 | Apache Tika vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T07:03:40.228Z
Reserved: 2022-05-17T00:00:00.000Z
Link: CVE-2022-30973
No data.
Status : Modified
Published: 2022-05-31T14:15:07.897
Modified: 2024-11-21T07:03:39.357
Link: CVE-2022-30973
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA
Ubuntu USN