Dear dspace-tech Team,

I am writing to request your support regarding a critical Cross-Site 
Scripting (XSS) vulnerability that has been detected in our repository. 
According to the recent Qualys WAS report, a reflected XSS vulnerability 
has been identified on the browsing interface (specifically within the 
"browse/author" endpoint) of our repository. The report confirms that 
unsanitized user input is being echoed in the HTML response, which could 
allow an attacker to inject malicious scripts.

Key details include: • The vulnerability has been assigned a Severity Level 
5, indicating a confirmed and critical issue. • The issue appears when 
user-supplied data is not properly HTML-encoded, allowing XSS payloads to 
be reflected in the response. • Although no active exploit has been 
confirmed yet, the potential for credential theft and data compromise is 
significant.

Given the potential impact on our users and the integrity of the 
repository, I kindly request your assistance in reviewing the issue and 
advising on the appropriate remediation measures. Specifically, guidance on 
implementing robust HTML encoding and input validation to prevent the 
execution of injected scripts would be highly appreciated.

for example: 
https://demo.dspace.org/browse/author?value=Barquero-Romero,%20Jose%20Pablo%20%3Cscript%3E_q_q%3Drandom(Ppf3jbNx)%3C

Thank you for your prompt attention to this matter. I look forward to your 
expert advice and support to resolve this vulnerability as soon as possible.

Best regards,

-- 
All messages to this mailing list should adhere to the Code of Conduct: 
https://www.lyrasis.org/about/Pages/Code-of-Conduct.aspx
--- 
You received this message because you are subscribed to the Google Groups 
"DSpace Technical Support" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dspace-tech+unsubscr...@googlegroups.com.
To view this discussion visit 
https://groups.google.com/d/msgid/dspace-tech/8d577a2b-546f-49c1-a798-b57b6aea1bb8n%40googlegroups.com.

Reply via email to