Описание
Inconsistent input sanitisation leads to XSS vectors
Background
A variety of templates do not perform proper sanitization through HTML escaping.
Due to the lack of sanitization and use of jQuery.html(), there are a whole host of XSS possibilities with specially crafted input to a variety of fields.
Impact
OMERO.web before 5.11.0 and OMERO.figure before 4.4.1.
Patches
Users should upgrade OMERO.web to 5.11.0 or higher and OMERO.figure to 4.4.1 or higher.
Ссылки
- https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf
- https://nvd.nist.gov/vuln/detail/CVE-2021-41132
- https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424
- https://github.com/pypa/advisory-database/tree/main/vulns/omero-figure/PYSEC-2021-379.yaml
- https://github.com/pypa/advisory-database/tree/main/vulns/omero-web/PYSEC-2021-372.yaml
- https://www.openmicroscopy.org/security/advisories/2021-SV3
Пакеты
omero-web
< 5.11.0
5.11.0
omero-figure
< 4.4.1
4.4.1
EPSS
9.3 Critical
CVSS4
9.8 Critical
CVSS3
CVE ID
Дефекты
Связанные уязвимости
OMERO.web provides a web based client and plugin infrastructure. In versions prior to 5.11.0, a variety of templates do not perform proper sanitization through HTML escaping. Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of cross-site scripting possibilities with specially crafted input to a variety of fields. This issue is patched in version 5.11.0. There are no known workarounds aside from upgrading.
EPSS
9.3 Critical
CVSS4
9.8 Critical
CVSS3