Description
DSpace open source software is a repository application which provides durable access to digital resources. dspace-jspui is a UI component for DSpace. The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI. Users are advised to upgrade. There are no known workarounds for this issue.
Remediation
References
https://github.com/DSpace/DSpace/commit/35030a23e48b5946f5853332c797e1c4adea7bb7
https://github.com/DSpace/DSpace/commit/6f75bb084ab1937d094208c55cd84340040bcbb5
https://github.com/DSpace/DSpace/commit/c89e493e517b424dea6175caba54e91d3847fc3a
https://github.com/DSpace/DSpace/commit/ebb83a75234d3de9be129464013e998dc929b68d
https://github.com/DSpace/DSpace/security/advisories/GHSA-c558-5gfm-p2r8
Related Vulnerabilities
CVE-2021-32013 Vulnerability in npm package xlsx
CVE-2022-24785 Vulnerability in maven package org.fujion.webjars:moment
CVE-2014-0230 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2021-23562 Vulnerability in npm package plupload
CVE-2021-21421 Vulnerability in npm package node-etsy-client