First published: Tue May 31 2022(Updated: )
We failed to apply the fix for <a href="https://access.redhat.com/security/cve/CVE-2022-30126">CVE-2022-30126</a> to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. Reference: <a href="https://www.openwall.com/lists/oss-security/2022/05/31/2">https://www.openwall.com/lists/oss-security/2022/05/31/2</a>
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tika:tika-core | >=1.17<1.28.3 | 1.28.3 |
Apache Tika | <1.28.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30973 is a vulnerability in Apache Tika that could lead to denial of service caused by backtracking on a specially crafted file.
CVE-2022-30973 affects Apache Tika versions 1.17 to 1.28.2, causing a denial of service vulnerability due to a backtracking issue with regular expressions.
CVE-2022-30973 has a severity rating of 5.5 (medium).
To fix the CVE-2022-30973 vulnerability in Apache Tika, you should update to version 1.28.3 or later.
You can find more information about CVE-2022-30973 at the following references: [CVE-2022-30973 on CVE](https://www.cve.org/CVERecord?id=CVE-2022-30973) and [CVE-2022-30973 on NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-30973).