All,

In recent weeks, a two different security vulnerabilities where discovered in the XMLUI and JSPUI.

WE RECOMMEND ALL SITES UPGRADE TO EITHER DSPACE 3.6, 4.5 OR 5.5 to ensure your site is secure. (Please note that the DSpace 5.5 release also includes bug fixes to the 5.x platform.)

 *    DSpace 5.5
     o Release Notes:
       https://wiki.duraspace.org/display/DSDOC5x/Release+Notes
       <https://wiki.duraspace.org/display/DSDOC5x/Release+Notes>
     o Download: https://github.com/DSpace/DSpace/releases/tag/dspace-5.5
 *    DSpace 4.5
     o Release Notes:
       https://wiki.duraspace.org/display/DSDOC4x/Release+Notes
       <https://wiki.duraspace.org/display/DSDOC4x/Release+Notes>
     o Download: https://github.com/DSpace/DSpace/releases/tag/dspace-4.5
 *    DSpace 3.6
     o Release Notes:
       https://wiki.duraspace.org/display/DSPACE/DSpace+Release+3.6+Notes
     o Download: https://github.com/DSpace/DSpace/releases/tag/dspace-3.6

Summary of XMLUI Vulnerability (affects 1.5.x and above):

 * /[HIGH SEVERITY] The XMLUI "themes" path is vulnerable to a full
   directory traversal. (DS-3094
   <https://jira.duraspace.org/browse/DS-3094> - requires a JIRA/Wiki
   account to access.) This means that ANY files on your system which
   are readable to the Tomcat user account may be publicly accessed via
   your DSpace site./This XMLUI vulnerability has existed since DSpace
   1.5.x, and was discovered by Virginia Tech.
     o While we highly recommend upgrading, patches are also available
       by visiting the ticket linked above (requires a JIRA/Wiki
       account to access).
     o As 1.5.x, 1.6.x, 1.7.x and 1.8.x sites are also affected, we
       recommend 1.x.x. sites consider upgrading to 5.x or manually
       applying a patch. Beginning with DSpace 5.x, we now provide an
       easier upgrade process from any prior version of DSpace (1.x.x,
       3.x or 4.x). See the 5.x release notes for more information:
       https://wiki.duraspace.org/display/DSDOC5x/Release+Notes
       <https://wiki.duraspace.org/display/DSDOC5x/Release+Notes>

Summary of JSPUI Vulnerability (affects 4.x and above):

 * /[MEDIUM SEVERITY] The JSPUI "Edit News" feature (accessible to
   Administrators) can be used to view/edit ANY files which are
   readable to the Tomcat user account (DS-3063
   <https://jira.duraspace.org/browse/DS-3063> - requires a JIRA/Wiki
   account to access.) /This JSPUI vulnerability has existed since
   DSpace 4.0, and was discovered byCINECA.

As these vulnerabilities are now considered "public", questions may be asked on our DSpace Tech Support mailing list (https://groups.google.com/forum/#!forum/dspace-tech <https://groups.google.com/forum/#%21forum/dspace-tech>) or on the tickets themselves.

We also welcome private security reports, concerns or questions via our new security contact address ([email protected]).

Sincerely,

Tim Donohue (on behalf of the DSpace Committers)

--
Tim Donohue
Technical Lead for DSpace & DSpaceDirect
DuraSpace.org | DSpace.org | DSpaceDirect.org

--
You received this message because you are subscribed to the Google Groups "DSpace 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/dspace-community.
For more options, visit https://groups.google.com/d/optout.

Reply via email to