Miggo Logo

CVE-2022-30973: Regular expression denial of service in apache tika

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.33253%
Published
6/1/2022
Updated
8/24/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.tika:tika-coremaven>= 1.17, < 1.28.31.28.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the original REGEX_HEADER pattern in StandardsText.java, which used vulnerable unbounded quantifiers. The commit diff shows direct modification of this regex to add bounds (e.g., {1,10} instead of +), confirming it as the root cause. Though not a traditional function, the regex definition acts as a critical configuration point consumed by pattern-matching logic. The CWE-1333 classification and patch context explicitly identify this regex as the vulnerable component.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

W* **il** to *pply t** *ix *or *V*-****-***** to t** *.x *r*n** in t** *.**.* r*l**s*. In *p**** Tik*, * r**ul*r *xpr*ssion in t** St*n**r*sT*xt *l*ss, us** *y t** St*n**r*s*xtr**tin**ont*nt**n*l*r *oul* l*** to * **ni*l o* s*rvi** **us** *y ***ktr*

Reasoning

T** vuln*r**ility st*ms *rom t** ori*in*l R***X_*****R p*tt*rn in St*n**r*sT*xt.j*v*, w*i** us** vuln*r**l* un*oun*** qu*nti*i*rs. T** *ommit *i** s*ows *ir**t mo*i*i**tion o* t*is r***x to *** *oun*s (*.*., {*,**} inst*** o* +), *on*irmin* it *s t**