Description
The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.
Published: 2018-07-10
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-0501 The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.
Github GHSA Github GHSA GHSA-4m9r-5gqp-7j82 High severity vulnerability that affects org.dspace:dspace-xmlui
History

No history.

Subscriptions

Duraspace Dspace
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:30:20.173Z

Reserved: 2018-07-10T00:00:00.000Z

Link: CVE-2016-10726

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-10T11:29:00.223

Modified: 2024-11-21T02:44:36.280

Link: CVE-2016-10726

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses