org.apache.tika:tika-parsers@1.4 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.tika:tika-parsers package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

org.apache.tika:tika-parsers is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Denial of Service (DoS) via the MP3Parser.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tika:tika-parsers to version 1.26 or higher.

[,1.26)
  • M
Denial of Service (DoS)

org.apache.tika:tika-parsers is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Denial of Service (DoS). A carefully crafted or corrupt file may trigger a System.exit in Tika's OneNote Parser. Crafted or corrupted files can also cause out of memory errors and/or infinite loops in Tika's ICNSParser, MP3Parser, MP4Parser, SAS7BDATParser, OneNoteParser and ImageParser.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tika:tika-parsers to version 1.24.1 or higher.

[,1.24.1)
  • M
Denial of Service (DoS)

org.apache.tika:tika-parsers is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Denial of Service (DoS). A carefully crafted or corrupt PSD file can cause excessive memory usage in the PSDParser.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tika:tika-parsers to version 1.24 or higher.

[1.0,1.24)
  • M
Denial of Service (DoS)

org.apache.tika:tika-parsers is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Denial of Service (DoS). A carefully crafted or corrupt PSD file can cause an infinite loop in the PSDParser.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tika:tika-parsers to version 1.24 or higher.

[1.0,1.24)
  • H
XML External Entity (XXE) Injection

org.apache.tika:tika-parsers is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. The XML parsers were not configured to limit entity expansion.

How to fix XML External Entity (XXE) Injection?

Upgrade org.apache.tika:tika-parsers to version 1.19 or higher.

[1.0,1.19)
  • M
Denial of Service (DoS)

org.apache.tika:tika-parsers is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Denial of Service (DoS). A carefully crafted file can trigger an infinite loop in the IptcAnpaParser.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tika:tika-parsers to version 1.19 or higher.

[1.2,1.19)
  • M
Denial of Service (DoS)

org.apache.tika:tika-parsers is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Denial of Service (DoS) attacks. A carefully crafted (or fuzzed) file can trigger an infinite loop via the BPGParser.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tika:tika-parsers to version 1.18 or higher.

[,1.18)
  • M
Denial of Service (DoS)

org.apache.tika:tika-parsers is a toolkit for detecting and extracting metadata and structured text content from various documents using existing parser libraries.

Affected versions of this package are vulnerable to Denial of Service (DoS) via a carefully crafted (or fuzzed) file can trigger an infinite loop via the ChmParser.

How to fix Denial of Service (DoS)?

Upgrade org.apache.tika:tika-parsers to version 1.18 or higher.

[,1.18)