Show filters
25 Total Results
Displaying 1-10 of 25
Sort by:
Attacker Value
High

Apache Tika Header Command Injection CVE-2018-1335

Disclosure Date: April 25, 2018 (last updated December 06, 2023)
From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.
0
Attacker Value
Unknown

CVE-2022-33879

Disclosure Date: June 27, 2022 (last updated November 29, 2024)
The initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler were insufficient, and we found a separate, new regex DoS in a different regex in the StandardsExtractingContentHandler. These are now fixed in 1.28.4 and 2.4.1.
Attacker Value
Unknown

CVE-2022-30973

Disclosure Date: May 31, 2022 (last updated November 29, 2024)
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
Attacker Value
Unknown

CVE-2022-30126

Disclosure Date: May 16, 2022 (last updated October 07, 2023)
In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.2 and 2.4.0
Attacker Value
Unknown

CVE-2022-25169

Disclosure Date: May 16, 2022 (last updated November 29, 2024)
The BPG parser in versions of Apache Tika before 1.28.2 and 2.4.0 may allocate an unreasonable amount of memory on carefully crafted files.
Attacker Value
Unknown

CVE-2021-33813

Disclosure Date: June 16, 2021 (last updated November 08, 2023)
An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request.
Attacker Value
Unknown

CVE-2021-28657

Disclosure Date: March 31, 2021 (last updated November 08, 2023)
A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later.
Attacker Value
Unknown

CVE-2020-9489

Disclosure Date: April 27, 2020 (last updated November 08, 2023)
A carefully crafted or corrupt file may trigger a System.exit in Tika's OneNote Parser. Crafted or corrupted files can also cause out of memory errors and/or infinite loops in Tika's ICNSParser, MP3Parser, MP4Parser, SAS7BDATParser, OneNoteParser and ImageParser. Apache Tika users should upgrade to 1.24.1 or later. The vulnerabilities in the MP4Parser were partially fixed by upgrading the com.googlecode:isoparser:1.1.22 dependency to org.tallison:isoparser:1.9.41.2. For unrelated security reasons, we upgraded org.apache.cxf to 3.3.6 as part of the 1.24.1 release.
Attacker Value
Unknown

CVE-2020-1950

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
A carefully crafted or corrupt PSD file can cause excessive memory usage in Apache Tika's PSDParser in versions 1.0-1.23.
Attacker Value
Unknown

CVE-2020-1951

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
A carefully crafted or corrupt PSD file can cause an infinite loop in Apache Tika's PSDParser in versions 1.0-1.23.