CVE-2022-30973 in Apache and Canonical Products
Published on May 31, 2022
Missing fix for CVE-2022-30126 in 1.28.2
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Products Associated with CVE-2022-30973
stack.watch emails you whenever new vulnerabilities are published in Apache Tika or Canonical Ubuntu Linux. Just hit a watch button to start following.
Affected Versions
Apache Software Foundation Apache Tika:- Version Apache Tika, <= 1.28.2 is affected.
Exploit Probability
EPSS
0.29%
Percentile
52.30%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.