Cross-site Scripting (XSS) - Stored in pkp/pkp-lib
翻译中…平台
php
组件
pkp/pkp-lib
修复版本
3.4.0-4
CVE-2023-5896 describes a stored Cross-Site Scripting (XSS) vulnerability discovered in the pkp-lib GitHub repository prior to version 3.4.0-4. Successful exploitation could allow an attacker to inject malicious scripts into the application, potentially impacting user accounts and system integrity. This vulnerability affects versions of pkp-lib up to and including 3.4.0-4, and a fix is available in version 3.4.0-4.
影响与攻击场景翻译中…
The XSS vulnerability allows an attacker to inject arbitrary JavaScript code into the pkp-lib application. This code could be executed in the context of a victim's browser when they visit a compromised page. An attacker could leverage this to steal session cookies, redirect users to malicious websites, or deface the application. The stored nature of the XSS means the malicious script persists until removed, potentially affecting multiple users over time. While the CVSS score is LOW, the potential for session hijacking and data theft warrants prompt remediation.
利用背景翻译中…
CVE-2023-5896 was publicly disclosed on November 1, 2023. There are currently no known public exploits or active campaigns targeting this vulnerability. The vulnerability is not listed on the CISA KEV catalog. While the CVSS score is low, proactive patching is recommended to prevent potential exploitation.
哪些人处于风险中翻译中…
Organizations and individuals using Open Journal Systems (OJS) or other applications built on pkp-lib versions prior to 3.4.0-4 are at risk. This includes academic institutions, publishers, and researchers who rely on OJS for managing their journals.
检测步骤翻译中…
• php / web:
curl -I https://your-ojs-domain.com/ | grep -i content-security-policy• php / web: Review user input fields for improper sanitization and encoding. • php / web: Examine application logs for suspicious JavaScript code being injected or executed. • php / web: Check for unusual user behavior or redirects originating from the application.
攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
0.07% (20% 百分位)
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 高 — 需要管理员或特权账户。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 低 — 可访问部分数据。
- Integrity
- 无 — 无完整性影响。
- Availability
- 无 — 无可用性影响。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2023-5896 is to upgrade to version 3.4.0-4 or later of pkp-lib. If an immediate upgrade is not feasible, consider implementing input validation and output encoding on user-supplied data to prevent script injection. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Review and sanitize any user-generated content within the pkp-lib application to identify and remove potentially malicious scripts. After upgrading, confirm the vulnerability is resolved by attempting to inject a simple script and verifying it is not executed.
修复方法翻译中…
Actualice la biblioteca pkp/pkp-lib a la versión 3.4.0-4 o superior. Esto corregirá la vulnerabilidad XSS almacenada. Puede actualizar la biblioteca utilizando Composer o descargando la última versión del repositorio y reemplazando los archivos.
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2023-5896 — XSS in pkp-lib Open Journal Systems?
CVE-2023-5896 is a stored Cross-Site Scripting (XSS) vulnerability affecting pkp-lib versions up to 3.4.0-4, allowing attackers to inject malicious scripts.
Am I affected by CVE-2023-5896 in pkp-lib Open Journal Systems?
You are affected if you are using pkp-lib versions 3.4.0-4 or earlier. Check your version and upgrade if necessary.
How do I fix CVE-2023-5896 in pkp-lib Open Journal Systems?
Upgrade to version 3.4.0-4 or later of pkp-lib. Implement input validation and output encoding as a temporary measure.
Is CVE-2023-5896 being actively exploited?
As of now, there are no known public exploits or active campaigns targeting CVE-2023-5896.
Where can I find the official pkp-lib advisory for CVE-2023-5896?
Refer to the official pkp-lib security advisory on their GitHub repository for detailed information and updates: https://github.com/pkp/pkp-lib/security/advisories/GHSA-796g-355j-499x