IBM Support

Security Bulletin: Security Vulnerability in Apache Tika used by Content Collector for Email in Content Search Services container (affected, not vulnerable)

Security Bulletin


Summary

In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in Apache Tika v1.28.3.

Vulnerability Details

CVEID:   CVE-2022-30973
DESCRIPTION:   Apache Tika is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw in the StandardsText class in the StandardsExtractingContentHandler. By persuading a victim to open a specially-crafted file, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/227638 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)

Affected Products and Versions

IBM Enterprise Content Management Text Search - 5.5.4.0 Marked as Invalid

 

Affected Product(s)Version(s)
IBM Enterprise Content Management Text Search5.5.8.0
5.5.9.0
FileNet Content Manager5.5.8.0
5.5.9.0
CP4BA21.0.3
22.0.1

 

Remediation/Fixes

To resolve these vulnerabilities, install one of the patch sets listed below to upgrade Apache Tika in new ICC release.

ProductVRMFAPARRemediation/First Fix
FileNet Content Manager
5.5.8
5.5.9
PJ46861
PJ46861
5.5.8.0-P8CSS-IF002 - 7/27/2022
5.5.9.0-P8CSS-IF001 - 10/26/2022
CP4BA
21.0.3
22.0.1
PJ46861
PJ46861
21.0.3-IF11 - 7/27/2022
22.0.1-IF1   - 7/27/2022

In the above table, the APAR links will provide more information about the fix.



Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Change History

26 October 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSNVNV","label":"FileNet Content Manager"},"Component":"Content Search Services, Content Search Services Container","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF051","label":"Linux on IBM Z Systems"},{"code":"PF033","label":"Windows"}],"Version":"5.5.4; 5.5.8; 5.5.9","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
02 November 2022

UID

ibm16606657