Description
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this issue.
Remediation
References
https://github.com/DSpace/DSpace/commit/35030a23e48b5946f5853332c797e1c4adea7bb7
https://github.com/DSpace/DSpace/commit/6f75bb084ab1937d094208c55cd84340040bcbb5
https://github.com/DSpace/DSpace/commit/c89e493e517b424dea6175caba54e91d3847fc3a
https://github.com/DSpace/DSpace/commit/ebb83a75234d3de9be129464013e998dc929b68d
https://github.com/DSpace/DSpace/security/advisories/GHSA-c558-5gfm-p2r8
Related Vulnerabilities
CVE-2023-33962 Vulnerability in maven package io.jstach:jstachio
CVE-2021-41251 Vulnerability in npm package @sap-cloud-sdk/core
CVE-2020-28478 Vulnerability in npm package gsap
CVE-2023-29529 Vulnerability in npm package matrix-js-sdk
CVE-2020-15084 Vulnerability in maven package org.webjars.npm:express-jwt