CVE-2022-30126

Source
https://cve.org/CVERecord?id=CVE-2022-30126
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-30126.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-30126
Aliases
Downstream
Related
Published
2022-05-16T17:05:13Z
Modified
2026-05-01T04:12:12.117750Z
Summary
Apache Tika Regular Expression Denial of Service in Standards Extractor
Details

In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.2 and 2.4.0

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/30xxx/CVE-2022-30126.json",
    "cna_assigner": "apache",
    "unresolved_ranges": [
        {
            "extracted_events": [
                {
                    "introduced": "Apache Tika"
                },
                {
                    "last_affected": "1.28.1"
                }
            ],
            "source": "AFFECTED_FIELD"
        }
    ]
}
References

Affected packages

Git / github.com/apache/tika

Affected ranges

Type
GIT
Repo
https://github.com/apache/tika
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Introduced
Fixed
Database specific
{
    "cpe": "cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.28.3"
        },
        {
            "introduced": "2.0.0"
        },
        {
            "fixed": "2.4.0"
        }
    ],
    "source": "CPE_FIELD"
}

Affected versions

1.*
1.12
1.12-rc1
1.15-rc1
1.17
1.18-rc1
1.19.1
1.19.1-rc1
1.20
1.21
1.23
1.23-rc1
1.24.1
1.25
1.26
1.27
1.28.1
1.28.2
2.*
2.0.0
2.0.0-ALPHA
2.1.0
2.2.0
2.2.1
2.3.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-30126.json"