CVE-2022-31194: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in DSpace DSpace
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace user, by modifying some request parameters during submission. This path traversal can only be executed by a user with special privileges (submitter rights). This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds. However, this vulnerability cannot be exploited by an anonymous user or a basic user. The user must first have submitter privileges to at least one Collection and be able to determine how to modify the request parameters to exploit the vulnerability.
AI Analysis
Technical Summary
CVE-2022-31194 is a path traversal vulnerability affecting the DSpace open source repository software, specifically its JSPUI component used for user interface interactions. DSpace is widely used for managing and providing durable access to digital resources, often in academic, research, and cultural heritage institutions. The vulnerability resides in the resumable upload implementations within the SubmissionController and FileUploadRequest classes. An attacker with submitter privileges—meaning they have rights to submit content to at least one collection—can manipulate request parameters during the submission process to perform path traversal attacks. This allows the creation of files or directories at arbitrary locations on the server's filesystem where the Tomcat or DSpace user has write permissions. The vulnerability is limited to JSPUI versions between 4.0 and 5.11 and versions 6.0 up to but not including 6.4. Exploitation requires authenticated access with submitter rights, and anonymous or basic users cannot exploit this flaw. There are no known workarounds, and the recommended mitigation is to upgrade to a patched version of DSpace. No known exploits have been observed in the wild. The vulnerability is classified under CWE-22, indicating improper limitation of a pathname to a restricted directory, which can lead to unauthorized file system access and potential compromise of the underlying server environment.
Potential Impact
For European organizations using DSpace, particularly universities, research institutions, and cultural heritage archives, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their digital repositories. An attacker with submitter privileges could leverage this flaw to write malicious files or scripts outside the intended directories, potentially leading to server compromise, data tampering, or disruption of repository services. This could result in unauthorized data disclosure, loss of trust, and operational downtime. Since DSpace often hosts sensitive academic and research data, exploitation could also impact intellectual property and compliance with data protection regulations such as GDPR. The requirement for submitter privileges limits the attack surface but does not eliminate risk, especially in environments with large or loosely controlled submitter user bases. The absence of known exploits in the wild suggests limited active targeting so far, but the vulnerability's nature means it could be leveraged for privilege escalation or lateral movement if combined with other weaknesses.
Mitigation Recommendations
Organizations should prioritize upgrading DSpace installations to versions 5.11 or later for the 4.x branch and 6.4 or later for the 6.x branch, where this vulnerability is patched. Until upgrades are applied, administrators should audit and restrict submitter privileges rigorously, ensuring only trusted users have submission rights. Implement strict monitoring and logging of submission activities to detect anomalous parameter modifications indicative of exploitation attempts. Additionally, deploying web application firewalls (WAFs) with custom rules to detect and block path traversal patterns in upload requests can provide a temporary protective layer. Regularly review and harden file system permissions for the Tomcat/DSpace user to minimize writable directories outside intended paths. Conduct security awareness training for submitters to reduce the risk of insider threats or accidental misuse. Finally, maintain up-to-date backups of repository data to enable recovery in case of compromise.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy, Spain, Belgium, Finland, Denmark
CVE-2022-31194: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in DSpace DSpace
Description
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace user, by modifying some request parameters during submission. This path traversal can only be executed by a user with special privileges (submitter rights). This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds. However, this vulnerability cannot be exploited by an anonymous user or a basic user. The user must first have submitter privileges to at least one Collection and be able to determine how to modify the request parameters to exploit the vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2022-31194 is a path traversal vulnerability affecting the DSpace open source repository software, specifically its JSPUI component used for user interface interactions. DSpace is widely used for managing and providing durable access to digital resources, often in academic, research, and cultural heritage institutions. The vulnerability resides in the resumable upload implementations within the SubmissionController and FileUploadRequest classes. An attacker with submitter privileges—meaning they have rights to submit content to at least one collection—can manipulate request parameters during the submission process to perform path traversal attacks. This allows the creation of files or directories at arbitrary locations on the server's filesystem where the Tomcat or DSpace user has write permissions. The vulnerability is limited to JSPUI versions between 4.0 and 5.11 and versions 6.0 up to but not including 6.4. Exploitation requires authenticated access with submitter rights, and anonymous or basic users cannot exploit this flaw. There are no known workarounds, and the recommended mitigation is to upgrade to a patched version of DSpace. No known exploits have been observed in the wild. The vulnerability is classified under CWE-22, indicating improper limitation of a pathname to a restricted directory, which can lead to unauthorized file system access and potential compromise of the underlying server environment.
Potential Impact
For European organizations using DSpace, particularly universities, research institutions, and cultural heritage archives, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their digital repositories. An attacker with submitter privileges could leverage this flaw to write malicious files or scripts outside the intended directories, potentially leading to server compromise, data tampering, or disruption of repository services. This could result in unauthorized data disclosure, loss of trust, and operational downtime. Since DSpace often hosts sensitive academic and research data, exploitation could also impact intellectual property and compliance with data protection regulations such as GDPR. The requirement for submitter privileges limits the attack surface but does not eliminate risk, especially in environments with large or loosely controlled submitter user bases. The absence of known exploits in the wild suggests limited active targeting so far, but the vulnerability's nature means it could be leveraged for privilege escalation or lateral movement if combined with other weaknesses.
Mitigation Recommendations
Organizations should prioritize upgrading DSpace installations to versions 5.11 or later for the 4.x branch and 6.4 or later for the 6.x branch, where this vulnerability is patched. Until upgrades are applied, administrators should audit and restrict submitter privileges rigorously, ensuring only trusted users have submission rights. Implement strict monitoring and logging of submission activities to detect anomalous parameter modifications indicative of exploitation attempts. Additionally, deploying web application firewalls (WAFs) with custom rules to detect and block path traversal patterns in upload requests can provide a temporary protective layer. Regularly review and harden file system permissions for the Tomcat/DSpace user to minimize writable directories outside intended paths. Conduct security awareness training for submitters to reduce the risk of insider threats or accidental misuse. Finally, maintain up-to-date backups of repository data to enable recovery in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3978
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 1:05:46 AM
Last updated: 8/16/2025, 5:21:44 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.