The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A reflected cross-site scripting vulnerability has been identified in Goobi viewer core prior to version 23.03 when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser. The vulnerability has been fixed in version 23.03.
References
Configurations
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/intranda/goobi-viewer-core/commit/c29efe60e745a94d03debc17681c4950f3917455 - Patch | |
References | () https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-7v7g-9vx6-vcg2 - Vendor Advisory |
Information
Published : 2023-04-06 20:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29014
Mitre link : CVE-2023-29014
CVE.ORG link : CVE-2023-29014
JSON object : View
Products Affected
intranda
- goobi_viewer_core
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')