CVE-2021-41189 – org.dspace:dspace-api
Package
Manager: maven
Name: org.dspace:dspace-api
Vulnerable Version: >=7.0 <7.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00607 pctl0.68739
Details
Communities and collections administrators can escalate their privilege up to system administrator ### Impact Any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only existed in 7.0 and does not impact 6.x or below. ### Patches Fix is included in [7.1](https://github.com/DSpace/DSpace/releases/tag/dspace-7.1). Please upgrade to 7.1 at your earliest convenience. ### Workarounds In 7.0, temporarily disable the ability for community or collection administrators to manage permissions or workflows settings, i.e. set the following properties in your local.cfg / dspace.cfg file ``` core.authorization.collection-admin.policies = false core.authorization.community-admin.policies = false core.authorization.community-admin.collection.workflows = false ``` Once upgraded to 7.1, these settings can be safely reverted to the default values of `true`. ### References Discovered during investigation of https://github.com/DSpace/DSpace/issues/7928 ### For more information If you have any questions or comments about this advisory: * Email us at security@dspace.org
Metadata
Created: 2021-11-01T19:18:16Z
Modified: 2021-10-29T17:26:35Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-cf2j-vf36-c6w8/GHSA-cf2j-vf36-c6w8.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-cf2j-vf36-c6w8
Finding: F006
Auto approve: 1