CVE-2021-41189
📋 TL;DR
CVE-2021-41189 is a privilege escalation vulnerability in DSpace 7.0 where community or collection administrators can elevate their permissions to become system administrators. This allows unauthorized users to gain full administrative control over the repository system. Only DSpace 7.0 installations are affected.
💻 Affected Systems
- DSpace
📦 What is this software?
Dspace by Duraspace
⚠️ Risk & Real-World Impact
Worst Case
An attacker with community/collection admin access gains full system administrator privileges, allowing complete control over the repository including data manipulation, user management, and system configuration changes.
Likely Case
Malicious or compromised community/collection administrators escalate to system admin and perform unauthorized actions like data exfiltration, privilege manipulation, or system disruption.
If Mitigated
With proper access controls and monitoring, impact is limited to detection of unauthorized privilege escalation attempts and containment of affected accounts.
🎯 Exploit Status
Exploitation requires existing community or collection administrator credentials. The vulnerability is in the web interface and likely easy to exploit once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.1
Vendor Advisory: https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8
Restart Required: Yes
Instructions:
1. Backup your DSpace installation and database. 2. Download DSpace 7.1 from the official repository. 3. Follow the upgrade instructions at https://wiki.lyrasis.org/display/DSDOC7x/Upgrading+DSpace. 4. Restart the application server.
🔧 Temporary Workarounds
Disable permission management for community/collection admins
allTemporarily remove ability for community or collection administrators to manage permissions or workflow settings as suggested in the advisory.
Modify DSpace configuration to restrict permission management capabilities for non-system administrators
🧯 If You Can't Patch
- Implement strict monitoring of community/collection admin activities and privilege changes
- Reduce number of community/collection administrators to minimum required and implement additional authentication controls
🔍 How to Verify
Check if Vulnerable:
Check DSpace version: if running 7.0, you are vulnerable. Review user roles and recent permission changes in admin logs.
Check Version:
Check DSpace web interface admin panel or examine dspace.version property in configuration files
Verify Fix Applied:
Confirm DSpace version is 7.1 or higher. Test that community/collection admins cannot escalate to system admin privileges.
📡 Detection & Monitoring
Log Indicators:
- Unexpected permission escalation events
- Community/collection admin accounts gaining system admin privileges
- Changes to system configuration by non-system administrators
Network Indicators:
- Unusual admin interface access patterns from community/collection admin accounts
SIEM Query:
source="dspace.log" AND ("permission escalation" OR "admin privilege" OR "system.admin")
🔗 References
- https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
- https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a
- https://github.com/DSpace/DSpace/issues/7928
- https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8
- https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041
- https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a
- https://github.com/DSpace/DSpace/issues/7928
- https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8