org.apache.tika:tika-core@2.0.0-ALPHA vulnerabilities

  • latest version

    3.0.0

  • latest non vulnerable version

  • first published

    15 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.tika:tika-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Regular Expression Denial of Service (ReDoS)

    org.apache.tika:tika-core is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to incomplete fix of CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade org.apache.tika:tika-core to version 1.28.4, 2.4.1 or higher.

    [,1.28.4)[2.0.0-ALPHA,2.4.1)
    • M
    Regular Expression Denial of Service (ReDoS)

    org.apache.tika:tika-core is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via a specially crafted file, when being parsed by the StandardsText class, which is used by StandardsExtractingContentHandler.

    Note: This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade org.apache.tika:tika-core to version 1.28.3, 2.4.0 or higher.

    [,1.28.3)[2.0.0-ALPHA,2.4.0)