Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03djdnLTl2eDYtdmNnMs4AAyoN
Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter
Impact
A reflected cross-site scripting vulnerability has been identified in Goobi viewer core when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser.
Patches
The vulnerability has been fixed in version 23.03
Credits
We would like to thank RUS-CERT for reporting this issues.
If you have any questions or comments about this advisory:
- Email us at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03djdnLTl2eDYtdmNnMs4AAyoN
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 6 months ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-7v7g-9vx6-vcg2, CVE-2023-29014
References:
- https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-7v7g-9vx6-vcg2
- https://nvd.nist.gov/vuln/detail/CVE-2023-29014
- https://github.com/intranda/goobi-viewer-core/commit/c29efe60e745a94d03debc17681c4950f3917455
- https://github.com/advisories/GHSA-7v7g-9vx6-vcg2
Affected Packages
maven:io.goobi.viewer:viewer-core
Versions: < 23.03Fixed in: 23.03