
We found results for “”
CVE-2022-30973
Good to know:


Date: May 31, 2022
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Language: Java
Severity Score
Related Resources (11)
Severity Score
Weakness Type (CWE)
Inefficient Regular Expression Complexity
CWE-1333Top Fix

Upgrade Version
Upgrade to version AllureReport.Generator - no_fix;finbarrmccarthy/tika - no_fix;opencontent/eztika-ls - 1.0;novactive/ezsolrsearchextrabundle - dev-ibexa4.6-solr;novactive/ezsolrsearchextrabundle - v3.0.0;novactive/ezsolrsearchextrabundle - v1.3.1;novactive/ezsolrsearchextrabundle - dev-missing-facet-entry;ninoskopac/php-tika-wrapper - no_fix;vufind/vufind - dev-legacy/mink-autoretry;vufind/vufind - dev-pullrequest_accessib_turn-my-account-menu-into-ul;vufind/vufind - v3.1;vufind/vufind - dev-release-5.0;vufind/vufind - dev-legacy/lbs4-daia;xrow/eztika-ls - 1.5;xrow/eztika-ls - 1.14.0;xrow/eztika-ls - 1.10.0;networkteam/tika - dev-task-update-flow-40;ogogo/tika - no_fix;polozpavlo/allure - no_fix;enzim/tika-wrapper - no_fix;marcelomx/tika-client - no_fix;JMeter - 5.5.0;wakumaku/php-tika-server - no_fix;elasticms/core-bundle - 1.9.55;org.apache.tika:tika-eval-app:2.4.0;org.apache.tika:tika-server-core:2.4.0;org.apache.tika:tika-app:1.28.3;org.apache.tika:tika-app:2.4.1;org.apache.tika:tika-core:1.0;org.apache.tika:tika-core:2.4.0;org.apache.tika:tika-core:1.28.3;org.modeshape:modeshape-jca:3.4.0.Final;org.apache.tika:tika-eval-core:2.4.0;org.apache.tika:tika-server:1.28.3;org.apache.tika:tika-server-client:2.4.0;org.apache.tika:tika-server-standard:2.4.0;org.apache.tika:tika-eval:1.28.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | REQUIRED |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | HIGH |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | PARTIAL |
Additional information: |