CVE-2022-30973 – org.apache.tika:tika-core
Package
Manager: maven
Name: org.apache.tika:tika-core
Vulnerable Version: >=1.17 <1.28.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00128 pctl0.3301
Details
Regular expression denial of service in apache tika We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Metadata
Created: 2022-06-01T00:00:36Z
Modified: 2023-08-24T20:25:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-qw3f-w4pf-jh5f/GHSA-qw3f-w4pf-jh5f.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-qw3f-w4pf-jh5f
Finding: F211
Auto approve: 1