Description
The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A reflected cross-site scripting vulnerability has been identified in Goobi viewer core prior to version 23.03 when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser. The vulnerability has been fixed in version 23.03.
Remediation
References
https://github.com/intranda/goobi-viewer-core/commit/c29efe60e745a94d03debc17681c4950f3917455
https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-7v7g-9vx6-vcg2
Related Vulnerabilities
CVE-2020-28472 Vulnerability in maven package org.webjars.bower:aws-sdk
CVE-2021-21252 Vulnerability in maven package org.webjars:jquery-validation
CVE-2018-14732 Vulnerability in maven package org.webjars.npm:webpack-dev-server
CVE-2023-6460 Vulnerability in npm package @google-cloud/firestore
CVE-2021-21290 Vulnerability in maven package io.netty:netty-transport-native-epoll