Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-31195

Опубликовано: 01 авг. 2022
Источник: nvd
CVSS3: 7.2
EPSS Низкий

Описание

DSpace open source software is a repository application which provides durable access to digital resources. In affected versions the ItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with special privileges (either Administrators or someone with command-line access to the server). This vulnerability impacts the XMLUI, JSPUI and command-line. Users are advised to upgrade. As a basic workaround, users may block all access to the following URL paths: If you are using the XMLUI, block all access to /admin/batchimport path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path "/xmlui", then you'd need to block access to /xmlui/admin/batchimport. If you are using the JSPUI, block all access to /dspace-admin

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:duraspace:dspace:*:*:*:*:*:*:*:*
Версия от 4.0 (включая) до 5.10 (включая)
cpe:2.3:a:duraspace:dspace:*:*:*:*:*:*:*:*
Версия от 6.0 (исключая) до 6.4 (исключая)

EPSS

Процентиль: 74%
0.0083
Низкий

7.2 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.2
github
больше 3 лет назад

DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import

EPSS

Процентиль: 74%
0.0083
Низкий

7.2 High

CVSS3

Дефекты

CWE-22