All,
This is real. Please do NOT forward or discuss this on public lists. We
ask that you please email [email protected] privately if there are any
questions.
I've immediately deleted this email (and Paul's) from the online
archives. Hopefully we managed to do so prior to Google web crawlers
indexing it.
- Tim
On 3/14/2016 9:18 AM, Paul Go wrote:
We just got this emailed directly to us. I've seen no chatter on the
DSpace list. Is this real or no?
Paul Go
Systems Librarian /
Library Technology Manager
Paul V. Galvin Library
Illinois Institute of Technology
35 West 33rd Street
Chicago, IL 60616
312.567.7997 <tel:312.567.7997>
[email protected] <mailto:[email protected]>
/Driving Innovation through Knowledge and Scholarship/
---------- Forwarded message ----------
From: *DuraSpace Security* <[email protected]
<mailto:[email protected]>>
Date: Mon, Mar 14, 2016 at 8:47 AM
Subject: [URGENT] Major DSpace security vulnerability affecting all
XMLUI sites
To: DuraSpace Security <[email protected] <mailto:[email protected]>>
Hello,
The DSpace Committers team has been notified of a major security
vulnerability affecting all sites that use the XMLUI (DSpace
versions 1.5.x, 1.6.x, 1.7.x, 1.8.x, 3.x, 4.x and 5.x). JSPUI
sites are unaffectedby this vulnerability.
If exploited, this vulnerability may allow an anonymous user to
view any file on your filesystem that is accessible to the Tomcat
user account. By default, this may include your dspace.cfg file
(and all related DSpace configurations) as well as any operating
system files that are readable by the Apache Tomcat user account.
The Committers team is working rapidly to patch this vulnerability
in the DSpace XMLUI codebase and release security fixes for 3.x,
4.x and 5.x versions.
We expect 3.x, 4.x and 5.x security releases (and patches) to be
made publicly available on Monday, March 21st. In the meantime, we
have quick fixes available at the bottom of this email which will
ensure your site is notvulnerable to these attacks. (Please pass
them along to the individual who manages your DSpace.)
We ask that you please keep this information confidentialand avoid
posting questions to our public DSpace mailing lists. In order to
protect DSpace sites, we will not be disclosing any further
details of the vulnerability until the security releases/patches
are available.
If you have any questions or concerns, we’ve set up a
[email protected] <mailto:[email protected]>email address
which can be used to privately contact the DSpace Committers and
DuraSpace staff.
The quick fix options can be found below. Please apply one of them
to your site immediately.Because of the nature of this
vulnerability, we also recommend changing any passwords (or secure
information) that appear in your DSpace configuration files (e.g.
database connection passwords).
Sincerely,
Tim Donohue (on behalf of the DSpace Committers)
Tech Lead for DSpace
Quick Fixes for XMLUI Vulnerability
We HIGHLY RECOMMEND applying one of the following “quick fixes” to
your production site immediately.These quick fixes are designed to
block all known attack paths and may be left in place until you
are able to upgrade to one of the forthcoming DSpace security
releases. Because of the nature of this vulnerability, we also
recommend changing any passwords(or secure information) that
appear in your DSpace configuration files (e.g. database
connection passwords).
We have three quick fixes available, based on your local DSpace
setup. You only need to choose ONE.
*
Apache Web Server Quick Fix (for sites that run an Apache Web
Server in front of Tomcat)
*
NGINX Web Server Quick Fix (for sites that run an NGINX Web
Server in front of Tomcat)
*
DSpace XMLUI Sitemap Quick Fix (for sites that simply run
Tomcat or another Java servlet container)
If you have any questions or concerns about these quick fixes,
please email [email protected] <mailto:[email protected]>.
These quick fixes are all considered production-ready, and have
already been applied to DSpace sites managed by various DSpace
Committers.
Option #1: Apache Web Server Quick Fix
For any sites that use Apache in front of Tomcat, you canblock all
affected URLs at the Apache level using "mod_rewrite". This does
notactually fix the problem in DSpace, but it does block access to
the vulnerable URLs (until you are able to upgrade). For example:
# Temporary block using Apache + mod_rewrite
# This redirects all vulnerable URLs to /error
# (which doesn't exist and throws a 404 response)
RewriteEngine On
RewriteRule ^/+themes/.*:.*$ /error [R=permanent,L]
# If your DSpace XMLUI URL starts with "/xmlui", you should use
this instead:
# RewriteRule ^/+xmlui/+themes/.*:.*$ /xmlui/error [R=permanent,L]
After putting these rules in place, you should be able to simply
reload Apache to apply these changes to your site (e.g. sudo
service apache2 reload). Be sure to apply this fix for both HTTP
and HTTPS URLs, if your site responds to both.
To verify the quick fix is working, visit a URL like:
http://[dspace.url]/themes/Reference/test:url (Be sure to test
both HTTP and HTTPS). The URL should be redirected to
[dspace.url]/error/ and a Page Cannot be Found response returned.
As long as this occurs, the quick fix was successful.
Option #2: NGINX Web Server Quick Fix
For any sites that use NGINX in front of Tomcat, you canblock all
affected URLs from NGINX. This does notactually fix the problem in
DSpace, but it does block access to the vulnerable URLs (until you
are able to upgrade). Add this to your server or location directive:
rewrite ^/+themes/.*:.*$ /error permanent;
# If your DSpace XMLUI URL starts with “/xmlui”, you should use
this instead:
# rewrite ^/+xmlui/+themes/.*:.*$ /xmlui/error permanent;
Then run nginx configtest followed by reload.
To verify the quick fix is working, visit a URL like:
http://[dspace.url]/themes/Reference/test:url (Be sure to test
both HTTP and HTTPS). The URL should be redirected to
[dspace.url]/error/ and a Page Cannot be Found response returned.
As long as this occurs, the quick fix was successful.
Option #3: XMLUI Root Sitemap Quick Fix
If you are NOTusing Apache or NGINX, it is also possible to block
all affected URLs within the DSpace XMLUI root sitemap itself.
Similar to the above fixes, this can be done while the DSpace site
is up-and-running.
Simply find the root sitemap (usually at
[dspace]/webapps/xmlui/sitemap.xmap) and add the following:
<!-- Temporary block -->
<!-- Internally redirect all vulnerable URLs to /error (which
doesn't exist and throws a 404) -->
<map:match pattern="themes/**:**">
<map:redirect-to uri="{request:contextPath}/error"
permanent="yes"/>
</map:match>
<!-- NOTE: the above section should be added just BEFORE this next
following section (which exists around line #623-625) -->
<!-- handle common theme resources, such as dri2xhtml -->
<map:match pattern="themes/*">
<map:read src="themes/{1}"/>
</map:match>
The change will take effect immediately. Any of the vulnerable
URLs will be redirected to "/error" (which doesn't exist in
DSpace, and will cause DSpace to simply return a 404 Page Not
Found error).
To verify the quick fix is working, visit a URL like:
http://[dspace.url]/themes/Reference/test:url (Be sure to test
both HTTP and HTTPS). The URL should be redirected to
[dspace.url]/error/ and a Page Cannot be Found response returned.
As long as this occurs, the quick fix was successful.
If you plan to rebuild/redeploy your DSpace in the near future
(prior to your next upgrade), you also should ensure this quick
fix is copied into your source code at
[dspace-src]/dspace-xmlui/src/main/webapp/sitemap.xmap (or
[dspace-src]/dspace/modules/xmlui/src/main/webapp/sitemap.xmap if
you are using overlays). That way any future rebuilds and
redeploys do not accidentally overwrite these changes.
--
You received this message because you are subscribed to the Google
Groups "DSpace Community" group.
To unsubscribe from this group and stop receiving emails from it, send
an email to [email protected]
<mailto:[email protected]>.
To post to this group, send email to [email protected]
<mailto:[email protected]>.
Visit this group at https://groups.google.com/group/dspace-community.
For more options, visit https://groups.google.com/d/optout.
--
Tim Donohue
Technical Lead for DSpace & DSpaceDirect
DuraSpace.org | DSpace.org | DSpaceDirect.org
--
You received this message because you are subscribed to the Google Groups "DSpace
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/dspace-community.
For more options, visit https://groups.google.com/d/optout.