icon

We found results for “

CVE-2022-30973

Good to know:

icon
icon

Date: May 31, 2022

We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Inefficient Regular Expression Complexity

CWE-1333

Top Fix

icon

Upgrade Version

Upgrade to version AllureReport.Generator - no_fix;finbarrmccarthy/tika - no_fix;opencontent/eztika-ls - 1.0;novactive/ezsolrsearchextrabundle - dev-ibexa4.6-solr;novactive/ezsolrsearchextrabundle - v3.0.0;novactive/ezsolrsearchextrabundle - v1.3.1;novactive/ezsolrsearchextrabundle - dev-missing-facet-entry;ninoskopac/php-tika-wrapper - no_fix;vufind/vufind - dev-legacy/mink-autoretry;vufind/vufind - dev-pullrequest_accessib_turn-my-account-menu-into-ul;vufind/vufind - v3.1;vufind/vufind - dev-release-5.0;vufind/vufind - dev-legacy/lbs4-daia;xrow/eztika-ls - 1.5;xrow/eztika-ls - 1.14.0;xrow/eztika-ls - 1.10.0;networkteam/tika - dev-task-update-flow-40;ogogo/tika - no_fix;polozpavlo/allure - no_fix;enzim/tika-wrapper - no_fix;marcelomx/tika-client - no_fix;JMeter - 5.5.0;wakumaku/php-tika-server - no_fix;elasticms/core-bundle - 1.9.55;org.apache.tika:tika-eval-app:2.4.0;org.apache.tika:tika-server-core:2.4.0;org.apache.tika:tika-app:1.28.3;org.apache.tika:tika-app:2.4.1;org.apache.tika:tika-core:1.0;org.apache.tika:tika-core:2.4.0;org.apache.tika:tika-core:1.28.3;org.modeshape:modeshape-jca:3.4.0.Final;org.apache.tika:tika-eval-core:2.4.0;org.apache.tika:tika-server:1.28.3;org.apache.tika:tika-server-client:2.4.0;org.apache.tika:tika-server-standard:2.4.0;org.apache.tika:tika-eval:1.28.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): HIGH
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us