Any community or collection administrator can escalate their permission up to become system administrator.
This vulnerability only existed in 7.0 and does not impact 6.x or below.
Fix is included in 7.1. Please upgrade to 7.1 at your earliest convenience.
In 7.0, temporarily disable the ability for community or collection administrators to manage permissions or workflows settings, i.e. set the following properties in your local.cfg / dspace.cfg file
core.authorization.collection-admin.policies = false
core.authorization.community-admin.policies = false
core.authorization.community-admin.collection.workflows = false
Once upgraded to 7.1, these settings can be safely reverted to the default values of true
.
Discovered during investigation of https://github.com/DSpace/DSpace/issues/7928
If you have any questions or comments about this advisory:
CPE | Name | Operator | Version |
---|---|---|---|
org.dspace:dspace-api | eq | 7.0-preview-1 | |
org.dspace:dspace-api | eq | 7.0 |
github.com/DSpace/DSpace
github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a
github.com/DSpace/DSpace/issues/7928
github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8
nvd.nist.gov/vuln/detail/CVE-2021-41189