org.apache.tika:tika-core@2.0.0-ALPHA vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.tika:tika-core package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Regular Expression Denial of Service (ReDoS)

org.apache.tika:tika-core is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to incomplete fix of CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade org.apache.tika:tika-core to version 1.28.4, 2.4.1 or higher.

[,1.28.4) [2.0.0-ALPHA,2.4.1)
  • M
Regular Expression Denial of Service (ReDoS)

org.apache.tika:tika-core is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via a specially crafted file, when being parsed by the StandardsText class, which is used by StandardsExtractingContentHandler.

Note: This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade org.apache.tika:tika-core to version 1.28.3, 2.4.0 or higher.

[,1.28.3) [2.0.0-ALPHA,2.4.0)