Логотип exploitDog
bind:CVE-2025-53622
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-53622

Количество 2

Количество 2

nvd логотип

CVE-2025-53622

7 месяцев назад

DSpace open source software is a repository application which provides durable access to digital resources. Prior to versions 7.6.4, 8.2, and 9.1, a path traversal vulnerability is possible during the import of an archive (in Simple Archive Format), either from command-line (`./dspace import` command) or from the "Batch Import (Zip)" user interface feature. An attacker may craft a malicious Simple Archive Format (SAF) package where the `contents` file references any system files (using relative traversal sequences) which are readable by the Tomcat user. If such a package is imported, this will result in sensitive content disclose, including retrieving arbitrary files or configurations from the server where DSpace is running. The Simple Archive Format (SAF) importer / Batch Import (Zip) is only usable by site administrators (from user interface / REST API) or system administrators (from command-line). Therefore, to exploit this vulnerability, the malicious payload would have to be prov

CVSS3: 5.2
EPSS: Низкий
github логотип

GHSA-vhvx-8xgc-99wf

7 месяцев назад

DSpace is vulnerable to Path Traversal attacks when importing packages using Simple Archive Format

CVSS3: 5.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-53622

DSpace open source software is a repository application which provides durable access to digital resources. Prior to versions 7.6.4, 8.2, and 9.1, a path traversal vulnerability is possible during the import of an archive (in Simple Archive Format), either from command-line (`./dspace import` command) or from the "Batch Import (Zip)" user interface feature. An attacker may craft a malicious Simple Archive Format (SAF) package where the `contents` file references any system files (using relative traversal sequences) which are readable by the Tomcat user. If such a package is imported, this will result in sensitive content disclose, including retrieving arbitrary files or configurations from the server where DSpace is running. The Simple Archive Format (SAF) importer / Batch Import (Zip) is only usable by site administrators (from user interface / REST API) or system administrators (from command-line). Therefore, to exploit this vulnerability, the malicious payload would have to be prov

CVSS3: 5.2
0%
Низкий
7 месяцев назад
github логотип
GHSA-vhvx-8xgc-99wf

DSpace is vulnerable to Path Traversal attacks when importing packages using Simple Archive Format

CVSS3: 5.2
0%
Низкий
7 месяцев назад

Уязвимостей на страницу