First published: Mon May 16 2022(Updated: )
In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. Reference: <a href="http://www.openwall.com/lists/oss-security/2022/05/16/3">http://www.openwall.com/lists/oss-security/2022/05/16/3</a>
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tika | <1.28.3 | |
Apache Tika | >=2.0.0<2.4.0 | |
Oracle Primavera Unifier | >=17.7<=17.12 | |
Oracle Primavera Unifier | =18.8 | |
Oracle Primavera Unifier | =19.12 | |
Oracle Primavera Unifier | =20.12 | |
Oracle Primavera Unifier | =21.12 | |
maven/org.apache.tika:tika | >=1.17<1.28.2 | 1.28.2 |
maven/org.apache.tika:tika | >=2.0.0<2.4.0 | 2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-30126.
The severity of CVE-2022-30126 is medium with a CVSS score of 5.5.
The CVE-2022-30126 vulnerability in Apache Tika occurs due to a regular expression in the StandardsText class, which can lead to a denial of service caused by backtracking on a specially crafted file.
Versions 1.17 to 1.28.2 and versions 2.0.0 to 2.4.0 of Apache Tika are affected by CVE-2022-30126.
To fix the Apache Tika CVE-2022-30126 vulnerability, you should update your Apache Tika version to 1.28.2 or higher for versions 1.x and to 2.4.0 or higher for versions 2.x.