Description
The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A reflected cross-site scripting vulnerability has been identified in Goobi viewer core prior to version 23.03 when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser. The vulnerability has been fixed in version 23.03.
Remediation
References
https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-7v7g-9vx6-vcg2
https://github.com/intranda/goobi-viewer-core/commit/c29efe60e745a94d03debc17681c4950f3917455
Related Vulnerabilities
CVE-2017-12633 Vulnerability in maven package org.apache.camel:camel-hessian
CVE-2022-34192 Vulnerability in maven package org.jenkins-ci.plugins:ontrack
CVE-2023-32998 Vulnerability in maven package com.rapid7:jenkinsci-appspider-plugin
CVE-2023-50730 Vulnerability in maven package org.typelevel:grackle-core_3
CVE-2021-21621 Vulnerability in maven package org.jenkins-ci.plugins:support-core