DSpace is an open source turnkey repository application. In version 7.0, any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only exists in 7.0 and does not impact 6.x or below. This issue is patched in version 7.1. As a workaround, users of 7.0 may temporarily disable the ability for community or collection administrators to manage permissions or workflows settings.
References
Link | Resource |
---|---|
https://github.com/DSpace/DSpace/issues/7928 | Exploit Third Party Advisory |
https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a | Patch Third Party Advisory |
https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8 | Third Party Advisory |
https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041 | Patch Third Party Advisory |
Configurations
Information
Published : 2021-10-29 11:15
Updated : 2021-11-03 05:47
NVD link : CVE-2021-41189
Mitre link : CVE-2021-41189
JSON object : View
CWE
CWE-863
Incorrect Authorization
Products Affected
duraspace
- dspace