Plateforme
php
Composant
ojs
Corrigé dans
3.3.0-16
CVE-2023-5894 describes a Cross-Site Scripting (XSS) vulnerability discovered in the Open Journal Systems (OJS) platform. This vulnerability allows an attacker to inject malicious scripts into the system, potentially leading to unauthorized access and data compromise. The vulnerability affects versions of OJS prior to 3.3.0-16, and a patch has been released to address the issue.
The XSS vulnerability in OJS allows an attacker to inject arbitrary JavaScript code into web pages viewed by other users. This can be exploited to steal session cookies, redirect users to malicious websites, or deface the website. Successful exploitation could result in unauthorized access to user accounts, data breaches, and reputational damage. The stored nature of the XSS means the malicious script persists until removed, potentially affecting a large number of users over time.
CVE-2023-5894 was publicly disclosed on November 1, 2023. As of this writing, no public exploits have been reported, and it is not listed on the CISA KEV catalog. The LOW CVSS score indicates a relatively low probability of exploitation, but proactive patching is still recommended.
Academic institutions, publishers, and any organizations utilizing Open Journal Systems to manage and publish scholarly journals are at risk. Specifically, sites running older, unpatched versions of OJS are vulnerable. Shared hosting environments where multiple OJS instances reside on the same server are also at increased risk.
• php / web:
curl -I https://your-ojs-site.com/ | grep -i content-type• php / web: Check OJS version by inspecting the version.php file in the OJS installation directory.
• php / web: Review server access logs for suspicious POST requests containing JavaScript code.
disclosure
Statut de l'Exploit
EPSS
0.07% (percentile 22%)
Vecteur CVSS
The primary mitigation for CVE-2023-5894 is to upgrade to Open Journal Systems version 3.3.0-16 or later. If upgrading is not immediately feasible, consider implementing strict input validation and output encoding on all user-supplied data. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Regularly review and sanitize user-generated content to prevent the injection of malicious scripts.
Actualice Open Journal Systems a la versión 3.3.0-16 o superior. Esta versión contiene una corrección para la vulnerabilidad XSS almacenada. La actualización se puede realizar a través del panel de administración o descargando la última versión del software y reemplazando los archivos.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2023-5894 is a stored XSS vulnerability in Open Journal Systems (OJS) versions prior to 3.3.0-16, allowing attackers to inject malicious scripts.
You are affected if you are running Open Journal Systems version 3.3.0-16 or earlier. Check your version and upgrade if necessary.
Upgrade to Open Journal Systems version 3.3.0-16 or later to resolve the vulnerability. Consider input validation and WAF rules as interim measures.
As of now, there are no confirmed reports of active exploitation, but proactive patching is still recommended.
Refer to the official Open Journal Systems security advisories on their website or GitHub repository for the latest information.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.