Learn about CVE-2021-41189, a critical vulnerability in DSpace where communities and collections administrators can escalate their privileges. Impact, affected versions, and mitigation steps provided.
DSpace is an open source turnkey repository application. In version 7.0, any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only exists in version 7.0 and does not impact 6.x or below. The issue is patched in version 7.1. As a workaround, users of 7.0 may temporarily disable the ability for community or collection administrators to manage permissions or workflows settings.
Understanding CVE-2021-41189
What is CVE-2021-41189?
CVE-2021-41189 is a vulnerability in DSpace where communities and collections administrators can escalate their privilege to become system administrators in version 7.0.
The Impact of CVE-2021-41189
This vulnerability has a CVSS base score of 7.2, marking it as a high severity issue with high impacts on confidentiality, integrity, and availability. The attack complexity is low, and privileges required are high.
Technical Details of CVE-2021-41189
Vulnerability Description
The vulnerability allows community or collection administrators to elevate their permissions to system administrator in version 7.0 of DSpace.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited through a network attack vector with high impacts on confidentiality, integrity, and availability.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure to apply patches and updates released by DSpace to mitigate the vulnerability.