Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.dspace/dspace-parent
  4. ›
  5. CVE-2022-31189

CVE-2022-31189: Generation of Error Message Containing Sensitive Information

August 1, 2022 (updated August 8, 2022)

DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. When an “Internal System Error” occurs in the JSPUI, then entire exception (including stack trace) is available. Information in this stacktrace may be useful to an attacker in launching a more sophisticated attack. This vulnerability only impacts the JSPUI. This issue has been fixed in version 6.4. users are advised to upgrade. Users unable to upgrade should disable the display of error messages in their internal.jsp file.

References

  • github.com/DSpace/DSpace/commit/afcc6c3389729b85d5c7b0230cbf9aaf7452f31a
  • github.com/DSpace/DSpace/security/advisories/GHSA-c2j7-66m3-r4ff
  • nvd.nist.gov/vuln/detail/CVE-2022-31189

Code Behaviors & Features

Detect and mitigate CVE-2022-31189 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions after 4.0 before 6.4

Fixed versions

  • 6.4

Solution

Upgrade to version 6.4 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-209: Generation of Error Message Containing Sensitive Information

Source file

maven/org.dspace/dspace-parent/CVE-2022-31189.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:44 +0000.