Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-31195 : What You Need to Know

Learn about the path traversal vulnerability in DSpace affecting versions >= 6.0, < 6.4 and >= 4.0, < 5.11, allowing creation of files/directories by privileged users.

Understanding CVE-2022-31195

This CVE involves a path traversal vulnerability in the Simple Archive Format (SAF) package import functionality in DSpace, an open source repository application.

What is CVE-2022-31195?

In DSpace versions >= 6.0 and < 6.4, and >= 4.0 and < 5.11, the ItemImportServiceImpl is vulnerable to a path traversal issue. It allows a specially privileged user to create files or directories in areas where the Tomcat/DSpace user has write access.

The Impact of CVE-2022-31195

The vulnerability can be exploited by users with special privileges, like Administrators or those with command-line access, affecting XMLUI, JSPUI, and command-line functionalities. The CVSS base score of 7.2 denotes a high severity level with confidentiality, integrity, and availability impact.

Technical Details of CVE-2022-31195

Vulnerability Description

The vulnerability arises from improper validation of paths, enabling the creation of files/directories by malicious SAF packages in server locations with write privileges.

Affected Systems and Versions

DSpace versions >= 6.0 and < 6.4, and >= 4.0 and < 5.11 are impacted by this vulnerability.

Exploitation Mechanism

Users with specific privileges can exploit the vulnerability to create files/directories through SAF packages.

Mitigation and Prevention

Immediate Steps to Take

Users are recommended to upgrade DSpace to a non-vulnerable version. Additionally, blocking access to specific URL paths related to batch imports can mitigate risks.

Long-Term Security Practices

Practicing the principle of least privilege, ensuring user trust before importing SAF packages, and ongoing security monitoring are essential for long-term security.

Patching and Updates

Regularly updating DSpace to the latest secure versions and following security advisories are crucial to prevent exploitation of known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now