All,

Just an update on this report from Matyas.  We've been in touch with Matyas 
privately, and have verified that you should **not block access** to your 
"config.json".   This "config.json" file is meant to be public as it's 
runtime configuration for the Angular User Interface.  It's required to be 
public for client-side rendering (CSR) to function properly.  This means 
that, if you block access to the "config.json", then any pages/paths in 
your "ssr > excludePathPatterns" settings 
<https://wiki.lyrasis.org/display/DSDOC9x/User+Interface+Configuration#UserInterfaceConfiguration-ServerSideRendering(SSR)Settings>
 
will fail to load properly.

Therefore, if this public "config.json" is reported as a security 
vulnerability by your scanners, this is a *false positive.  *This file 
generally contains configurations which are already discoverable via the 
user interface, as these settings are used by the user's browser to run the 
Angular UI and contact the REST API.

That said, based on this report from Matyas, we have created a ticket (#5030 
<https://github.com/DSpace/dspace-angular/issues/5030>) to ensure we are 
*minimizing 
the information/settings* that are available in this public "config.json".  
Specifically, we're looking to remove any server-side specific 
configurations (especially those related to server-side rendering or SSR 
like the "rest > ssrBaseUrl"), as those could be moved to a private config 
file.  This change will help to minimize any unnecessary information in the 
public "config.json", and decrease the likelihood of security scanners 
flagging this file.

If there are any questions, feel free to ask them in this thread or on that 
ticket itself.

Tim
On Wednesday, January 21, 2026 at 10:19:55 AM UTC-6 [email protected] 
wrote:

> Hello!
>
> We have been announced by external audit about the potential vulnerability 
> in config.json file that is available on web at url path 
> /assets/config.json (like https://demo.dspace.org/assets/config.json ) 
> and physically stored among deployed dSpace web files in the same 
> directory. The report is attached below. This config file contains 
> configuration values that may expose external architecture, like internal 
> port of node.js.
> We have solved this issue by prohibiting access to the file in apache 
> configuration - we have added to httpd.conf:
> <Location "/assets/config.json">
>     Require all denied
> </Location>
>
> Has anybody more faced this issue, please? It refers to all dSpace version 
> 7-9 and probably should be solved generally.
>
> Thanks advance and happy dSpacing!
>
> Matyas F. Bajger
> University of Ostrava - University library
> https://library.osu.eu
>
>
> *-----------------------------------------------------------------------------------------------------------------------------------*
>
>
> *Summary of the Issue*
> Issue Type: Exposed config.json / Information Disclosure
> Technology: HTTP / JSON Configuration File
> Severity: Critical
> Affected Host: https://eduard.osu.cz/assets/config.json
> Description
> During testing, it was observed that the config.json file is publicly 
> accessible on the affected host. The file discloses base URL configuration 
> values, including references such as "http://localhost:4000/"; and "
> https://eduo.osu.cz/server";. This information may expose internal service 
> architecture and could be leveraged by an attacker for further 
> reconnaissance or exploitation.
> No sensitive credentials or active exploitation was observed during 
> testing.
> Potential Risks
> Exposure of API configuration and application settings
> Assistance in reconnaissance and mapping of system architecture
> Increased risk of targeted attacks when combined with other vulnerabilities
> Recommended Remediation
> Restrict public access to API configuration files
> Ensure sensitive configuration data is not exposed via public endpoints
> Review server configuration to prevent information disclosure
>

-- 
All messages to this mailing list should adhere to the Code of Conduct: 
https://lyrasis.org/code-of-conduct/
--- 
You received this message because you are subscribed to the Google Groups 
"DSpace Technical Support" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/dspace-tech/badf21c9-82af-4430-aa74-633191076fcan%40googlegroups.com.

Reply via email to