232
VMScore

CVE-2022-30973

Published: 31/05/2022 Updated: 27/10/2022
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 232
Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P

Vulnerability Summary

We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tika

Vendor Advisories

Synopsis Low: Red Hat Integration Camel-K 181 security update Type/Severity Security Advisory: Low Topic A micro version update is now available for Red Hat Integration Camel K The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Product Security has rated this update as having a sec ...
Debian Bug report logs - #1015002 tika: CVE-2022-25169 CVE-2022-30126 CVE-2022-33879 Package: src:tika; Maintainer for src:tika is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 15 Jul 2022 22:39:01 UTC Severity: important Tags: secu ...
We failed to apply the fix for CVE-2022-30126 to the 1x branch in the 1282 release In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file This only affects users who are running the StandardsExtractingCon ...