Skip to content

High severity vulnerability that affects org.dspace:dspace-xmlui

High severity GitHub Reviewed Published Oct 19, 2018 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

maven org.dspace:dspace-xmlui (Maven)

Affected versions

>= 4.0, < 4.5
>= 5.0, < 5.5
< 3.6

Patched versions

4.5
5.5
3.6

Description

The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.

References

Published to the GitHub Advisory Database Oct 19, 2018
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Weaknesses

CVE ID

CVE-2016-10726

GHSA ID

GHSA-4m9r-5gqp-7j82

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.