Description
The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A cross-site scripting vulnerability has been identified in the user comment feature of Goobi viewer core prior to version 23.03. An attacker could create a specially crafted comment, resulting in the execution of malicious script code in the user's browser when displaying the comment. The vulnerability has been fixed in version 23.03.
Remediation
References
https://github.com/intranda/goobi-viewer-core/commit/f0ccde2d469efd9597c3062d00177a63341f2256
https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-622w-995c-3c3h
Related Vulnerabilities
CVE-2016-6794 Vulnerability in maven package org.apache.tomcat:tomcat-util-scan
CVE-2023-30515 Vulnerability in maven package io.jenkins.plugins:thycotic-devops-secrets-vault
CVE-2019-10752 Vulnerability in npm package sequelize
CVE-2023-22467 Vulnerability in maven package org.webjars.npm:luxon
CVE-2020-5397 Vulnerability in maven package org.springframework:spring-webflux