7.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
0.001 Low
EPSS
Percentile
40.8%
The JSPUI spellcheck “Did you mean” HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI.
This vulnerability does NOT impact the XMLUI or 7.x.
DSpace 6.x:
DSpace 5.x:
If at all possible, we recommend upgrading your DSpace site based on the upgrade instructions. However, if you are unable to do so, you can manually apply the above patches as follows:
[dspace-src]
folder, apply the patch, e.g. git apply [name-of-file].patch
mvn -U clean package
(This will recompile all DSpace code)ant update
(This will copy all updated WARs / configs to your installation directory). Depending on your setup you also may need to copy the updated WARs over to your Tomcat webapps folder.Discovered & reported by Hassan Bhuiyan (Brunel University London)
If you have any questions or comments about this advisory:
github.com/DSpace/DSpace
github.com/DSpace/DSpace/commit/35030a23e48b5946f5853332c797e1c4adea7bb7
github.com/DSpace/DSpace/commit/6f75bb084ab1937d094208c55cd84340040bcbb5
github.com/DSpace/DSpace/commit/c89e493e517b424dea6175caba54e91d3847fc3a
github.com/DSpace/DSpace/commit/ebb83a75234d3de9be129464013e998dc929b68d
github.com/DSpace/DSpace/security/advisories/GHSA-c558-5gfm-p2r8
nvd.nist.gov/vuln/detail/CVE-2022-31191