Description
The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A reflected cross-site scripting vulnerability has been identified in Goobi viewer core prior to version 23.03 when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser. The vulnerability has been fixed in version 23.03.
Remediation
References
https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-7v7g-9vx6-vcg2
https://github.com/intranda/goobi-viewer-core/commit/c29efe60e745a94d03debc17681c4950f3917455
Related Vulnerabilities
CVE-2012-5885 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2020-11023 Vulnerability in npm package jquery
CVE-2021-21626 Vulnerability in maven package io.jenkins.plugins:warnings-ng
CVE-2023-28443 Vulnerability in npm package directus
CVE-2018-17244 Vulnerability in maven package org.elasticsearch:elasticsearch