Hi Sue,

> I am trying to find out if DSpace has ever been tested for cross-site 
> scripting and/or SQL injection vulnerabilities?

Yes it has.  It was first scanned some years back, and a big exercise was 
undertaken to clean up all database access via 'safe' centrally-managed 
database access methods that ensure safe practices such as parameter binding 
etc.

One institutional user of DSpace also undertook a scan during the development 
of 1.6, which resulted in some additional improvements such as session 
invalidation.

We (The University of Auckland) undertook an IBM AppScan a few months back, and 
this came out clean.

However...  we would be foolish to rest on our laurels, trust fully trust 
automated scans and not to keep up to date with regular testing, so there is 
always room for more if anyone has access to these tools and the time to run 
them, or to undertake more manual checks.

Also to note for anyone who does ever have concerns:  The committers group has 
fast-track methods of dealing with any possible security issues if they do 
arise, so please get in contact with any of the central Dursapce team who will 
be able to pass these on to the committers who ensure that they are dealt with 
top priority.

Thanks,


Stuart Lewis
IT Innovations Analyst and Developer
Te Tumu Herenga The University of Auckland Library
Auckland Mail Centre, Private Bag 92019, Auckland 1142, New Zealand
Ph: +64 (0)9 373 7599 x81928


------------------------------------------------------------------------------
Lotusphere 2011
Register now for Lotusphere 2011 and learn how
to connect the dots, take your collaborative environment
to the next level, and enter the era of Social Business.
http://p.sf.net/sfu/lotusphere-d2d
_______________________________________________
DSpace-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dspace-tech

Reply via email to