9.1
17 years ago
12 days ago
Known vulnerabilities in the org.dspace:dspace-api package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.dspace:dspace-api is a DSpace core data model and service APIs. Affected versions of this package are vulnerable to Directory Traversal in the import process when handling Simple Archive Format packages. An attacker can access sensitive files on the server by crafting a malicious archive where the Note: This is only exploitable if an administrator imports a malicious archive or an attacker obtains DSpace administrator credentials. How to fix Directory Traversal? Upgrade | [,7.6.4)[8.0,8.2)[9.0,9.1) |
org.dspace:dspace-api is a DSpace core data model and service APIs. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection via the XML parsing process during archive imports or when handling XML responses from upstream services. An attacker can access sensitive files or data by supplying a malicious XML payload that is processed by an administrator or by compromising an external service to deliver the payload. Note: This is only exploitable if an administrator imports a malicious archive or an attacker obtains DSpace administrator credentials. How to fix XML External Entity (XXE) Injection? Upgrade | [,7.6.4)[8.0,8.2)[9.0,9.1) |
org.dspace:dspace-api is a DSpace core data model and service APIs. Affected versions of this package are vulnerable to Directory Traversal in the Note:* Only an Administrative user or a user with command-line access to the server is able to import/upload SAF packages. Therefore, assuming those users do not blindly upload untrusted SAF packages, then it is unlikely your site could be impacted by this vulnerability. Also, this vulnerability does not impact version 7. How to fix Directory Traversal? Upgrade | [,5.11)[6.0,6.4) |