Headline
GHSA-622w-995c-3c3h: Goobi viewer Core has Cross-Site Scripting Vulnerability in User Comments
Impact
A cross-site scripting vulnerability has been identified in the user comment feature of Goobi viewer core. An attacker could create a specially crafted comment, resulting in the execution of malicious script code in the user’s browser when displaying the comment.
Patches
The vulnerability has been fixed in version 23.03
If you have any questions or comments about this advisory:
- Email us at [email protected]
Package
maven io.goobi.viewer:viewer-core (Maven)
Affected versions
< 23.03
Patched versions
23.03
Description
Impact
A cross-site scripting vulnerability has been identified in the user comment feature of Goobi viewer core. An attacker could create a specially crafted comment, resulting in the execution of malicious script code in the user’s browser when displaying the comment.
Patches
The vulnerability has been fixed in version 23.03
If you have any questions or comments about this advisory:
- Email us at [email protected]
References
- GHSA-622w-995c-3c3h
- https://nvd.nist.gov/vuln/detail/CVE-2023-29015
- intranda/goobi-viewer-core@f0ccde2
mgeerdsen published to intranda/goobi-viewer-core
Apr 6, 2023
Published by the National Vulnerability Database
Apr 6, 2023
Published to the GitHub Advisory Database
Apr 7, 2023
Reviewed
Apr 7, 2023
Last updated
Apr 7, 2023
Related news
The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A cross-site scripting vulnerability has been identified in the user comment feature of Goobi viewer core prior to version 23.03. An attacker could create a specially crafted comment, resulting in the execution of malicious script code in the user's browser when displaying the comment. The vulnerability has been fixed in version 23.03.