First published: Mon Jun 27 2022(Updated: )
The initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler were insufficient, and we found a separate, new regex DoS in a different regex in the StandardsExtractingContentHandler. These are now fixed in 1.28.4 and 2.4.1.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tika | <1.28.4 | |
Apache Tika | >=2.0.0<2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-33879.
The severity of CVE-2022-33879 is low.
Apache Tika versions up to and including 2.4.1 are affected by CVE-2022-33879.
To fix CVE-2022-33879, upgrade to Apache Tika version 2.4.1 or later.
You can find more information about CVE-2022-33879 at the following references: [Link 1](http://www.openwall.com/lists/oss-security/2022/06/27/5), [Link 2](https://lists.apache.org/thread/wfno8mf5nlcvbs78z93q9thgrm30wwfh), [Link 3](https://security.netapp.com/advisory/ntap-20220812-0004/)