Логотип exploitDog
bind:CVE-2022-31195
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-31195

Количество 2

Количество 2

nvd логотип

CVE-2022-31195

больше 3 лет назад

DSpace open source software is a repository application which provides durable access to digital resources. In affected versions the ItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with special privileges (either Administrators or someone with command-line access to the server). This vulnerability impacts the XMLUI, JSPUI and command-line. Users are advised to upgrade. As a basic workaround, users may block all access to the following URL paths: If you are using the XMLUI, block all access to /admin/batchimport path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path "/xmlui", then you'd need to block access to /xmlui/admin/batchimport. If you are using the JSPUI, block all access to /dspace-admin

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-8rmh-55h4-93h5

больше 3 лет назад

DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-31195

DSpace open source software is a repository application which provides durable access to digital resources. In affected versions the ItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with special privileges (either Administrators or someone with command-line access to the server). This vulnerability impacts the XMLUI, JSPUI and command-line. Users are advised to upgrade. As a basic workaround, users may block all access to the following URL paths: If you are using the XMLUI, block all access to /admin/batchimport path (this is the URL of the Admin Batch Import tool). Keep in mind, if your site uses the path "/xmlui", then you'd need to block access to /xmlui/admin/batchimport. If you are using the JSPUI, block all access to /dspace-admin

CVSS3: 7.2
1%
Низкий
больше 3 лет назад
github логотип
GHSA-8rmh-55h4-93h5

DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import

CVSS3: 7.2
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу