{"id":"CVE-2023-29014","summary":"Goobi viewer Core Reflected Cross-Site Scripting Vulnerability Using LOGID Parameter","details":"The Goobi viewer is a web application that allows digitised material to be displayed in a web browser. A reflected cross-site scripting vulnerability has been identified in Goobi viewer core prior to version 23.03 when evaluating the LOGID parameter. An attacker could trick a user into following a specially crafted link to a Goobi viewer installation, resulting in the execution of malicious script code in the user's browser. The vulnerability has been fixed in version 23.03.","aliases":["GHSA-7v7g-9vx6-vcg2"],"modified":"2026-04-10T04:57:03.803558Z","published":"2023-04-06T19:03:19.967Z","database_specific":{"cwe_ids":["CWE-79"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/29xxx/CVE-2023-29014.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/29xxx/CVE-2023-29014.json"},{"type":"ADVISORY","url":"https://github.com/intranda/goobi-viewer-core/security/advisories/GHSA-7v7g-9vx6-vcg2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-29014"},{"type":"FIX","url":"https://github.com/intranda/goobi-viewer-core/commit/c29efe60e745a94d03debc17681c4950f3917455"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/intranda/goobi-viewer-core","events":[{"introduced":"0"},{"fixed":"17a668c1ef54615132111881af1f7f02c8c86003"}]}],"versions":["v21.01","v21.01.1","v21.01.2","v21.01.3","v21.01.4","v21.01.5","v21.02","v21.02.1","v21.02.2","v21.02.3","v21.02.4","v21.03","v21.03.1","v21.03.2","v21.03.3","v21.04","v21.04.1","v21.04.2","v21.04.3","v21.04.4","v21.04.5","v21.05","v21.05.1","v21.05.2","v21.06","v21.06.1","v21.06.2","v21.06.3","v21.06.4","v21.06.5","v21.06.6","v21.06.7","v21.06.8","v21.07","v21.07.1","v21.07.2","v21.08","v21.08.1","v21.08.2","v21.08.3","v21.08.4","v21.08.5","v21.08.6","v21.08.7","v21.08.8","v21.08.9","v21.09","v21.09.1","v21.09.2","v21.09.3","v21.09.4","v21.10","v21.10.1","v21.10.2","v21.10.3","v21.10.4","v21.10.5","v21.11","v21.11.1","v21.11.2","v21.11.3","v21.11.4","v21.11.5","v21.11.6","v21.12","v22.01","v22.01.1","v22.01.2","v22.01.3","v22.02","v22.02.1","v22.02.2","v22.02.3","v22.03","v22.03.1","v22.05","v22.05.1","v22.06","v22.06.1","v22.06.2","v22.06.3","v22.06.4","v22.07","v22.08","v22.08.1","v22.08.2","v22.08.3","v22.08.4","v22.09","v22.10","v22.10.1","v22.10.2","v22.10.3","v22.10.4","v22.10.5","v22.11","v22.11.1","v22.12","v23.01","v23.01.1","v23.01.2","v23.02","v4.10.0","v4.10.1","v4.10.3","v4.11.0","v4.11.1","v4.12.0","v4.12.1","v4.12.2","v4.13.0","v4.13.1","v4.3.0","v4.3.1","v4.3.2","v4.3.3","v4.3.5","v4.3.6","v4.3.7","v4.3.8","v4.4.0","v4.5.0","v4.5.1","v4.6.0","v4.6.1","v4.6.2","v4.7.0","v4.7.1","v4.8.0","v4.8.1","v4.8.2","v4.8.3","v4.9.0","v4.9.1","v4.9.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-29014.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}