Lucene search

K
githubGitHub Advisory DatabaseGHSA-2R9R-8FCG-M38G
HistoryApr 07, 2023 - 7:22 p.m.

Goobi viewer Core has Cross-Site Scripting Vulnerability in User Nicknames

2023-04-0719:22:33
CWE-79
GitHub Advisory Database
github.com
15
cross-site scripting
user nicknames
vulnerability
patched
version 23.03
browser execution

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

40.4%

Impact

A cross-site scripting vulnerability has been identified in Goobi viewer core when using nicknames. An attacker could create a user account and enter malicious scripts into their profile’s nickname, resulting in the execution in the user’s browser when displaying the nickname on certain pages.

Patches

The vulnerability has been fixed in version 23.03

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
io.goobi.viewerviewer-coreRange<23.03
VendorProductVersionCPE
io.goobi.viewerviewer-core*cpe:2.3:a:io.goobi.viewer:viewer-core:*:*:*:*:*:*:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

40.4%

Related for GHSA-2R9R-8FCG-M38G