Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Kong AI Gateway 3.11 introduces new method for reducing token costs

      July 16, 2025

      Native vs hybrid vs cross-platform: Resolving the trilemma

      July 16, 2025

      JetBrains updates Junie, Gemini API adds embedding model, and more – Daily News Digest

      July 16, 2025

      Distribution Release: Rescuezilla 2.6.1

      July 16, 2025

      GitHub Availability Report: June 2025

      July 16, 2025

      My favorite Bose products are on sale plus an extra 25% discount – if you buy refurbished

      July 16, 2025

      Microsoft saved $500 million using AI — after slashing over 15,000 jobs in 2025

      July 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 16, 2025
      Recent

      The details of TC39’s last meeting

      July 16, 2025

      Vector Search Embeddings and RAG

      July 16, 2025

      Python Meets Power Automate: Trigger via URL

      July 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Distribution Release: Rescuezilla 2.6.1

      July 16, 2025
      Recent

      Distribution Release: Rescuezilla 2.6.1

      July 16, 2025

      InvenTree – inventory management system

      July 16, 2025

      Best Free and Open Source Alternatives to Autodesk Fusion

      July 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-53622 – DSpace Tomcat Path Traversal Vulnerability

    CVE-2025-53622 – DSpace Tomcat Path Traversal Vulnerability

    July 15, 2025

    CVE ID : CVE-2025-53622

    Published : July 15, 2025, 3:15 p.m. | 1 hour, 19 minutes ago

    Description : DSpace open source software is a repository application which provides durable access to digital resources. Prior to versions 7.6.4, 8.2, and 9.1, a path traversal vulnerability is possible during the import of an archive (in Simple Archive Format), either from command-line (`./dspace import` command) or from the “Batch Import (Zip)” user interface feature. An attacker may craft a malicious Simple Archive Format (SAF) package where the `contents` file references any system files (using relative traversal sequences) which are readable by the Tomcat user. If such a package is imported, this will result in sensitive content disclose, including retrieving arbitrary files or configurations from the server where DSpace is running. The Simple Archive Format (SAF) importer / Batch Import (Zip) is only usable by site administrators (from user interface / REST API) or system administrators (from command-line). Therefore, to exploit this vulnerability, the malicious payload would have to be provided by an attacker and trusted by an administrator (who would trigger the import). The fix is included in DSpace 7.6.4, 8.2 and 9.1. For those who cannot upgrade immediately, it is possible to manually patch the DSpace backend. (No changes are necessary to the frontend.) A pull request exists which can be used to patch systems running DSpace 7.6.x, 8.x or 9.0. Although it is not possible to fully protect the system via workarounds, one may can apply a best practice. Administrators must carefully inspect any SAF archives (they did not construct themselves) before importing, paying close attention to the `contents` file to validate it does not reference files outside of the SAF archives.

    Severity: 5.2 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-6972 – SOLIDWORKS eDrawings After Free Code Execution Vulnerability
    Next Article CVE-2025-53621 – DSpace XXE Injection Vulnerability

    Related Posts

    Development

    Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

    July 16, 2025
    Development

    CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises

    July 16, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-53513 – Juju Charm Zip Slip Unauthorized Upload Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-39355 – FAT Services Booking SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    Implementing Account Suspension in Laravel

    Development

    React Native & the Future of Mobile: Why Now Is the Time for Businesses to Invest📱

    Web Development

    Highlights

    Machine Learning

    A generative AI prototype with Amazon Bedrock transforms life sciences and the genome analysis process

    May 28, 2025

    It takes biopharma companies over 10 years, at a cost of over $2 billion and…

    CVE-2024-13953 – Raritan ASPECT Device Logger Credential Exposure Vulnerability

    May 22, 2025

    CVE-2025-5902 – TOTOLINK T10 Buffer Overflow in POST Request Handler

    June 9, 2025

    CISO’s Guide To Web Privacy Validation And Why It’s Important

    May 26, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.