{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T05:06:00.717","vulnerabilities":[{"cve":{"id":"CVE-2022-31189","sourceIdentifier":"security-advisories@github.com","published":"2022-08-01T21:15:13.217","lastModified":"2024-11-21T07:04:05.193","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. When an \"Internal System Error\" occurs in the JSPUI, then entire exception (including stack trace) is available. Information in this stacktrace may be useful to an attacker in launching a more sophisticated attack. This vulnerability only impacts the JSPUI. This issue has been fixed in version 6.4. users are advised to upgrade. Users unable to upgrade should disable the display of error messages in their internal.jsp file."},{"lang":"es","value":"El software de código abierto DSpace es una aplicación de repositorio que proporciona acceso duradero a los recursos digitales. dspace-jspui es un componente de interfaz de usuario para DSpace. Cuando es producido un \"Error interno del sistema\" en la JSPUI, la excepción completa (incluyendo el seguimiento de la pila) está disponible. La información en este stacktrace puede ser útil para un atacante para lanzar un ataque más sofisticado. Esta vulnerabilidad sólo afecta a la JSPUI. Este problema ha sido corregido en versión 6.4. Es recomendado a usuarios actualicen. Los usuarios que no puedan actualizarse deberán deshabilitar la visualización de mensajes de error en su archivo internal.jsp"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-209"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:duraspace:dspace:*:*:*:*:*:*:*:*","versionStartExcluding":"4.0","versionEndExcluding":"6.4","matchCriteriaId":"A5C7E6BD-3A22-4279-907B-6B2C76E0185C"}]}]}],"references":[{"url":"https://github.com/DSpace/DSpace/commit/afcc6c3389729b85d5c7b0230cbf9aaf7452f31a","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/DSpace/DSpace/security/advisories/GHSA-c2j7-66m3-r4ff","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/DSpace/DSpace/commit/afcc6c3389729b85d5c7b0230cbf9aaf7452f31a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/DSpace/DSpace/security/advisories/GHSA-c2j7-66m3-r4ff","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}