RSS   Vulnerabilities for 'Omero.web'   RSS

2021-03-23
 
CVE-2021-21377

CWE-601
 

 
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the omero.web.redirect_allowed_hosts setting.

 
 
CVE-2021-21376

CWE-200
 

 
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0.

 
2020-06-17
 
CVE-2020-7932

CWE-200
 

 
OMERO.web before 5.6.3 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the Referer header seen by the target. Information in the URL path such as object IDs may also be exposed.

 

 >>> Vendor: Openmicroscopy 5 Products
Omero
Omero.server
Omero.web
Omero-figure
Omero-web


Copyright 2024, cxsecurity.com

 

Back to Top