Hi all, We (several Committers) analyzed this vulnerability yesterday.
No version of DSpace appears to be vulnerable to CVE-2022-42889, based on the current information available. This includes DSpace 7.x, 6.x, 5.x and every other release before then. Apache Commons Text is only included in the DSpace 7.x releases. That said, if you are interested in updating your version of Apache Commons Text in DSpace 7.x, we have an early PR at https://github.com/DSpace/DSpace/pull/8537 This PR is still being tested/reviewed, but the results are good so far. It will be included in the upcoming 7.5 release (due in Feb 2023). This PR's description also contains notes of our analysis of this vulnerability. If more information becomes available about CVE-2022-42889 that causes a concern for DSpace, we'll reanalyze and possibly release an immediate patched version of 7.x. However, at this time, we don't anticipate that occurring. From what I'm reading, this security vulnerability is dangerous, but also very rare. Exploiting the vulnerability seems to require using a very specific feature of Apache Commons Text & passing it untrusted user input. DSpace doesn't use the vulnerable feature, and never passes any untrusted data to Apache Commons Text. If anyone has any further questions or concerns, feel free to reach out to me or email [email protected] (which goes to all active DSpace Committers). Thanks, Tim Donohue​ ________________________________ From: [email protected] <[email protected]> on behalf of [email protected] <[email protected]> Sent: Thursday, October 20, 2022 3:55 AM To: DSpace Community <[email protected]> Subject: [dspace-community] Apache Commons Text vulnerability Hi all, There has been discovered a vulnerability affecting versions 1.5 to 1.9 of Apache Commons Text: https://nvd.nist.gov/vuln/detail/CVE-2022-42889 I've seen DSpace 7 uses the 1.9 version of this library: https://github.com/DSpace/DSpace/blob/main/dspace-api/pom.xml#L850 It is recommended to update to 1.10, but I haven't tested it yet myself. Just wanted to make sure everyone who is using DSpace 7 in production is aware of this. Regards, Oriol PS: Here are some more links about the vulnerability https://www.rapid7.com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/ https://www.securityweek.com/critical-apache-commons-text-flaw-compared-log4shell-not-widespread https://nakedsecurity.sophos.com/2022/10/18/dangerous-hole-in-apache-commons-text-like-log4shell-all-over-again/ -- All messages to this mailing list should adhere to the Code of Conduct: https://www.lyrasis.org/about/Pages/Code-of-Conduct.aspx --- You received this message because you are subscribed to the Google Groups "DSpace Community" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]<mailto:[email protected]>. To view this discussion on the web visit https://groups.google.com/d/msgid/dspace-community/ce4d5055-d84d-4661-8adf-1d13c5164c73n%40googlegroups.com<https://groups.google.com/d/msgid/dspace-community/ce4d5055-d84d-4661-8adf-1d13c5164c73n%40googlegroups.com?utm_medium=email&utm_source=footer>. -- All messages to this mailing list should adhere to the Code of Conduct: https://www.lyrasis.org/about/Pages/Code-of-Conduct.aspx --- You received this message because you are subscribed to the Google Groups "DSpace Community" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/dspace-community/PH0PR22MB3274871C9B27C8E593E2A5EEED2A9%40PH0PR22MB3274.namprd22.prod.outlook.com.
