8/2/2023 0 Comments Xsection 5.11![]() ![]() ![]() Reported by Johannes Moritz of Ripstech.This path traversal is only possible by a user with special privileges (Administrators or someone with command-line access to the server). This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. CVE-2022-31195 (impacts XMLUI and JSPUI) : Path traversal vulnerability in Simple Archive Format package import (ItemImportService API).No database changes should be necessary when upgrading from DSpace 5.x to 5.11. As it only provides only security and bug fixes, DSpace 5.11 should constitute an easy upgrade from DSpace 5.x for most users. ![]() To ensure your 5.x site is secure, we highly recommend ALL DSpace 5.x users upgrade to DSpace 5.11.ĭSpace 5.11 upgrade instructions are available at: Upgrading DSpaceĭSpace 5.11 is a bug fix release to resolve several issues located in previous 5.x releases. *! Constructs a mapper object which is a child of \a parent.DSpace 5.11 contains security and bug fixes for both the JSPUI and XMLUI. SPDX-License-Identifier: LicenseRef-Qt-Commercial OR GPL-3.0-only #include #include #include #include #include #include Copyright (C) 2016 The Qt Company Ltd. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |