Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter
Moderate severity
GitHub Reviewed
Published
Apr 6, 2023
in
intranda/goobi-viewer-core
•
Updated Apr 7, 2023
Description
Published by the National Vulnerability Database
Apr 6, 2023
Published to the GitHub Advisory Database
Apr 7, 2023
Reviewed
Apr 7, 2023
Last updated
Apr 7, 2023
Impact
A reflected cross-site scripting vulnerability has been identified in Goobi viewer core when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser.
Patches
The vulnerability has been fixed in version 23.03
Credits
We would like to thank RUS-CERT for reporting this issues.
If you have any questions or comments about this advisory:
References