CVE-2022-30973
Missing fix for CVE-2022-30126 in 1.28.2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
No hemos aplicado la corrección de CVE-2022-30126 a la rama 1.x en la versión 1.28.2. En Apache Tika, una expresión regular en la clase StandardsText, utilizada por el StandardsExtractingContentHandler podría llevar a una denegación de servicio causada por el backtracking en un archivo especialmente diseñado. Esto sólo afecta a los usuarios que ejecutan StandardsExtractingContentHandler, que es un manejador no estándar. Esto se ha corregido en la versión 1.28.3
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-17 CVE Reserved
- 2022-05-31 CVE Published
- 2024-08-03 CVE Updated
- 2024-10-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-1333: Inefficient Regular Expression Complexity
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2022/05/31/2 | Mailing List | |
http://www.openwall.com/lists/oss-security/2022/06/27/5 | Mailing List | |
https://security.netapp.com/advisory/ntap-20220722-0004 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lists.apache.org/thread/gqvb5t4p7tmdpl0y5bdbf72pgxj04h7p | 2022-10-27 | |
https://access.redhat.com/security/cve/CVE-2022-30973 | 2022-10-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2099553 | 2022-10-27 |