Hi all,

We (several Committers) analyzed this vulnerability yesterday.

No version of DSpace appears to be vulnerable to CVE-2022-42889, based on the 
current information available.  This includes DSpace 7.x, 6.x, 5.x and every 
other release before then. Apache Commons Text is only included in the DSpace 
7.x releases.

That said, if you are interested in updating your version of Apache Commons 
Text in DSpace 7.x, we have an early PR at 
https://github.com/DSpace/DSpace/pull/8537

This PR is still being tested/reviewed, but the results are good so far.  It 
will be included in the upcoming 7.5 release (due in Feb 2023). This PR's 
description also contains notes of our analysis of this vulnerability.

If more information becomes available about CVE-2022-42889 that causes a 
concern for DSpace, we'll reanalyze and possibly release an immediate patched 
version of 7.x.  However, at this time, we don't anticipate that occurring. 
From what I'm reading, this security vulnerability is dangerous, but also very 
rare. Exploiting the vulnerability seems to require using a very specific 
feature of Apache Commons Text & passing it untrusted user input. DSpace 
doesn't use the vulnerable feature, and never passes any untrusted data to 
Apache Commons Text.

If anyone has any further questions or concerns, feel free to reach out to me 
or email [email protected] (which goes to all active DSpace Committers).

Thanks,

Tim Donohue​

________________________________
From: [email protected] <[email protected]> on 
behalf of [email protected] <[email protected]>
Sent: Thursday, October 20, 2022 3:55 AM
To: DSpace Community <[email protected]>
Subject: [dspace-community] Apache Commons Text vulnerability

Hi all,
There has been discovered a vulnerability affecting versions 1.5 to 1.9 of 
Apache Commons Text:
https://nvd.nist.gov/vuln/detail/CVE-2022-42889

I've seen DSpace 7 uses the 1.9 version of this library:
https://github.com/DSpace/DSpace/blob/main/dspace-api/pom.xml#L850

It is recommended to update to 1.10, but I haven't tested it yet myself. Just 
wanted to make sure everyone who is using DSpace 7 in production is aware of 
this.

Regards,
Oriol

PS: Here are some more links about the vulnerability
https://www.rapid7.com/blog/post/2022/10/17/cve-2022-42889-keep-calm-and-stop-saying-4shell/
https://www.securityweek.com/critical-apache-commons-text-flaw-compared-log4shell-not-widespread
https://nakedsecurity.sophos.com/2022/10/18/dangerous-hole-in-apache-commons-text-like-log4shell-all-over-again/

--
All messages to this mailing list should adhere to the Code of Conduct: 
https://www.lyrasis.org/about/Pages/Code-of-Conduct.aspx
---
You received this message because you are subscribed to the Google Groups 
"DSpace Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to 
[email protected]<mailto:[email protected]>.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/dspace-community/ce4d5055-d84d-4661-8adf-1d13c5164c73n%40googlegroups.com<https://groups.google.com/d/msgid/dspace-community/ce4d5055-d84d-4661-8adf-1d13c5164c73n%40googlegroups.com?utm_medium=email&utm_source=footer>.

-- 
All messages to this mailing list should adhere to the Code of Conduct: 
https://www.lyrasis.org/about/Pages/Code-of-Conduct.aspx
--- 
You received this message because you are subscribed to the Google Groups 
"DSpace Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/dspace-community/PH0PR22MB3274871C9B27C8E593E2A5EEED2A9%40PH0PR22MB3274.namprd22.prod.outlook.com.

Reply via email to