Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cf2j-vf36-c6w8

Опубликовано: 01 нояб. 2021
Источник: github
Github: Прошло ревью
CVSS3: 7.2

Описание

Communities and collections administrators can escalate their privilege up to system administrator

Impact

Any community or collection administrator can escalate their permission up to become system administrator.

This vulnerability only existed in 7.0 and does not impact 6.x or below.

Patches

Fix is included in 7.1. Please upgrade to 7.1 at your earliest convenience.

Workarounds

In 7.0, temporarily disable the ability for community or collection administrators to manage permissions or workflows settings, i.e. set the following properties in your local.cfg / dspace.cfg file

core.authorization.collection-admin.policies = false core.authorization.community-admin.policies = false core.authorization.community-admin.collection.workflows = false

Once upgraded to 7.1, these settings can be safely reverted to the default values of true.

References

Discovered during investigation of https://github.com/DSpace/DSpace/issues/7928

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.dspace:dspace-api

maven
Затронутые версииВерсия исправления

>= 7.0, < 7.1

7.1

EPSS

Процентиль: 70%
0.00627
Низкий

7.2 High

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 7.2
nvd
больше 4 лет назад

DSpace is an open source turnkey repository application. In version 7.0, any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only exists in 7.0 and does not impact 6.x or below. This issue is patched in version 7.1. As a workaround, users of 7.0 may temporarily disable the ability for community or collection administrators to manage permissions or workflows settings.

EPSS

Процентиль: 70%
0.00627
Низкий

7.2 High

CVSS3

Дефекты

CWE-863