7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
0.001 Low
EPSS
Percentile
31.0%
The JSPUI controlled vocabulary servlet is vulnerable to an open redirect attack, where an attacker can craft a malicious URL that looks like a legitimate DSpace/repository URL. When that URL is clicked by the target, it redirects them to a site of the attacker’s choice.
This vulnerability does NOT impact the XMLUI or 7.x.
DSpace 6.x:
DSpace 5.x:
If at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:
[dspace-src]
folder, apply the patch, e.g. git apply [name-of-file].patch
mvn -U clean package
(This will recompile all DSpace code)ant update
(This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.Discovered and reported by Johannes Moritz of Ripstech.
If you have any questions or comments about this advisory:
CPE | Name | Operator | Version |
---|---|---|---|
org.dspace:dspace-jspui | lt | 6.4 | |
org.dspace:dspace-jspui | ge | 4.0 | |
org.dspace:dspace-jspui | lt | 5.11 |