Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-29016: added nickname validator; html escape existing values when displaying; · intranda/goobi-viewer-core@8eadb32

The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A cross-site scripting vulnerability has been identified in Goobi viewer core prior to version 23.03 when using nicknames. An attacker could create a user account and enter malicious scripts into their profile’s nickname, resulting in the execution in the user’s browser when displaying the nickname on certain pages. The vulnerability has been fixed in version 23.03.

CVE
#xss#vulnerability#web#redis#git#java

@@ -0,0 +1,75 @@ /* * This file is part of the Goobi viewer - a content presentation and management * application for digitized objects. * * Visit these websites for more information. * - http://www.intranda.com * - http://digiverso.com * * This program is free software; you can redistribute it and/or modify it under * the terms of the GNU General Public License as published by the Free Software * Foundation; either version 2 of the License, or (at your option) any later * version. * * This program is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS * FOR A PARTICULAR PURPOSE. * See the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along with * this program. If not, see http://www.gnu.org/licenses/. */ package io.goobi.viewer.faces.validators;
import java.util.regex.Matcher; import java.util.regex.Pattern;
import javax.faces.application.FacesMessage; import javax.faces.component.UIComponent; import javax.faces.context.FacesContext; import javax.faces.validator.FacesValidator; import javax.faces.validator.Validator; import javax.faces.validator.ValidatorException;
import io.goobi.viewer.messages.ViewerResourceBundle;
/** * Syntax validator for names (e.g. nickname). */ @FacesValidator(“nameValidator”) public class NameValidator implements Validator<String> {
private static final String REGEX = "^[\\w ]+$"; //NOSONAR input size is limited private static final Pattern PATTERN = Pattern.compile(REGEX);
/* (non-Javadoc) * @see javax.faces.validator.Validator#validate(javax.faces.context.FacesContext, javax.faces.component.UIComponent, java.lang.Object) */ /** {@inheritDoc} */ @Override public void validate(FacesContext context, UIComponent component, String value) throws ValidatorException { if (!validate(value)) { FacesMessage msg = new FacesMessage(ViewerResourceBundle.getTranslation("pi_errInvalid", null), “”); msg.setSeverity(FacesMessage.SEVERITY_ERROR); throw new ValidatorException(msg); } }
/** * <p> * validateEmailAddress. * </p> * * @param email a {@link java.lang.String} object. * @should match correct name * @should not match invalid name * @return a boolean. */ public static boolean validate(String name) { if (name == null || name.length() > 10_000) { return false; } Matcher m = PATTERN.matcher(name.toLowerCase()); return m.find(); } }

Related news

GHSA-2r9r-8fcg-m38g: Goobi viewer Core has Cross-Site Scripting Vulnerability in User Nicknames

### Impact A cross-site scripting vulnerability has been identified in Goobi viewer core when using nicknames. An attacker could create a user account and enter malicious scripts into their profile's nickname, resulting in the execution in the user's browser when displaying the nickname on certain pages. ### Patches The vulnerability has been fixed in version 23.03 If you have any questions or comments about this advisory: * Email us at [[email protected]](mailto:[email protected])

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907