Description
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this issue.
Remediation
References
https://github.com/DSpace/DSpace/commit/c89e493e517b424dea6175caba54e91d3847fc3a
https://github.com/DSpace/DSpace/commit/35030a23e48b5946f5853332c797e1c4adea7bb7
https://github.com/DSpace/DSpace/commit/ebb83a75234d3de9be129464013e998dc929b68d
https://github.com/DSpace/DSpace/commit/6f75bb084ab1937d094208c55cd84340040bcbb5
https://github.com/DSpace/DSpace/security/advisories/GHSA-c558-5gfm-p2r8
Related Vulnerabilities
CVE-2019-18213 Vulnerability in maven package org.lsp4xml:lsp4xml-extensions
CVE-2023-30517 Vulnerability in maven package io.jenkins.plugins:neuvector-vulnerability-scanner
CVE-2023-38509 Vulnerability in maven package org.xwiki.platform:xwiki-platform-livetable-ui
CVE-2023-3691 Vulnerability in maven package org.webjars.npm:github-com-layui-layui
CVE-2021-28163 Vulnerability in maven package org.eclipse.jetty:jetty-deploy