Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03djdnLTl2eDYtdmNnMs4AAyoN

Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter

Impact

A reflected cross-site scripting vulnerability has been identified in Goobi viewer core when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser.

Patches

The vulnerability has been fixed in version 23.03

Credits

We would like to thank RUS-CERT for reporting this issues.

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-7v7g-9vx6-vcg2
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03djdnLTl2eDYtdmNnMs4AAyoN
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Identifiers: GHSA-7v7g-9vx6-vcg2, CVE-2023-29014
References: Repository: https://github.com/intranda/goobi-viewer-core
Blast Radius: 1.0

Affected Packages

maven:io.goobi.viewer:viewer-core
Affected Version Ranges: < 23.03
Fixed in: 23.03