GHSA-7v7g-9vx6-vcg2

Suggest an improvement
Source
https://github.com/advisories/GHSA-7v7g-9vx6-vcg2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-7v7g-9vx6-vcg2/GHSA-7v7g-9vx6-vcg2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7v7g-9vx6-vcg2
Aliases
Published
2023-04-07T19:22:41Z
Modified
2023-11-08T04:12:16.109357Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter
Details

Impact

A reflected cross-site scripting vulnerability has been identified in Goobi viewer core when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser.

Patches

The vulnerability has been fixed in version 23.03

Credits

We would like to thank RUS-CERT for reporting this issues.

If you have any questions or comments about this advisory: * Email us at support@intranda.com

Database specific
{
    "nvd_published_at": "2023-04-06T20:15:00Z",
    "github_reviewed_at": "2023-04-07T19:22:41Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Maven / io.goobi.viewer:viewer-core

Package

Name
io.goobi.viewer:viewer-core
View open source insights on deps.dev
Purl
pkg:maven/io.goobi.viewer/viewer-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
23.03